Académique Documents
Professionnel Documents
Culture Documents
SOCIAL MARKETING:
AN ANSWER FOR
CYBERBULLYING IN SINGAPORE
Ang Xue Ling
U0910563F
U0910727F
U0910967B
Supervisor:
Assoc Prof (Adj) Gerard Dionicio Gonzales
Applied Research Project submitted to the Nanyang Business School, Nanyang Technological
University in partial fulfilment for the degree of Bachelor of Business
ACKNOWLEGEMENT
We would like to express our most sincere gratitude and thanks to our Applied Research project
supervisor, Adj. Associate Professor Gerard Gonzales, for his patient guidance and continued
support throughout the duration of our project. Without his experience and guidance, the
completion of this project would not have been possible.
We would also like to extend our appreciation to Mr. Gilbert Goh, the founder of the Dont
Cyberbully forum for taking time out to provide us with his valuable insights and expertise in
the area of cyberbullying in Singapore. In addition, we would like to give special thanks to Ms.
Sylvia Ang from the Singapore Childrens Society for providing us with a better understanding
of the Societys work on bullying and cyber-wellness.
Lastly, we would also like to thank all the participants of our survey and all those who have also
helped us in the preparation of this study in one way or another.
ABSTRACT
Cyberbullying, referring to the wilful, deliberate and repeated harm through the use of electronic
devices such as computer, cell phones and other electronic devices, has increased in prevalence
with the rising usage of the Internet and social media. Unfortunately, this social issue is not
extensively studied in Singapore and hence this research study aims to obtain an in-depth and
holistic picture of the cyberbullying scene in Singapore.
A two pronged approach was adopted in this study. Interviews were first conducted with local
field experts to obtain a greater understanding of the cyberbullying situation in Singapore. After
which, a pre-designed questionnaire was distributed to respondents to obtain their attitudes and
motivations of cyberbullying, as well as their perspectives of certain social marketing strategies.
A total of 294 responses were collated.
The findings of this research has revealed that Singapore youths tend to engage in indirect
cyberbullying behaviours instead of direct cyberbullying behaviours and they prefer taking a
preventive approach when dealing with cyberbullying. Insights in social marketing strategies
include the effectiveness of personal recount as a campaign message strategy, the importance of
counsellors in addressing this social issue and social media being an effective campaign
promotional tool to Singapore youths.
ii
TABLE OF CONTENTS
ACKNOWLEGEMENT................................................................................................................ i
ABSTRACT ................................................................................................................................... ii
TABLE OF CONTENTS ............................................................................................................ iii
1.
INTRODUCTION ................................................................................................................. 1
1.1 Background ..................................................................................................................... 1
1.2 Research Questions ........................................................................................................ 2
1.3 Research Objectives ....................................................................................................... 3
1.4 Significance of Study ...................................................................................................... 3
1.5 Scope and Limitation ..................................................................................................... 4
1.6 Organization of paper .................................................................................................... 4
2.
3.
METHODOLOGY .............................................................................................................. 19
3.1 Research Approach ...................................................................................................... 19
3.2 Research Design............................................................................................................ 19
3.3 Data Collection Method ............................................................................................... 19
3.3.1 Exploratory research ................................................................................................................... 19
3.3.2 Definition of Terms ..................................................................................................................... 19
3.3.3 Hypotheses .................................................................................................................................. 21
3.3.4 Pre-test Survey ............................................................................................................................ 21
iii
5.
6.
CONCLUSION .................................................................................................................... 50
7.
REFERENCES..................................................................................................................... 51
8.
APPENDICES ...................................................................................................................... 54
Appendix A: Email to Request for Interview regarding Cyberbullying ........................ 54
iv
vi
viii
1. INTRODUCTION
1.1
Background
With an increased usage of the Internet and the pervasiveness of social media, a new form of
bullying, cyberbullying has emerged. Cyberbullying can cause victims to have a higher risk of
stress-related disorders, such as helplessness, anxiety and terror, and in some cases, suicide
(Nemours, 2009).
Singapore too, has had its share of cyberbullying incidents. Recently in February 2012, a case of
online sexual harassment was reported in the Nanyang Technological University. A male
undergraduate was accused of tricking female students into exposing certain parts of their body
through their webcams. He was also accused of hacking into a female students Facebook
account and masquerading as her. In a case of victims turning into bullies, the victims then
decided to take revenge online, by exposing his name and information in a note on Facebook to
alert their friends (The New Paper, 2012).
According to Internet World Stats, an international statistics website, Facebook has a penetration
of 56.1% of the Singapore population as at 31 December 2011. With Internet communication
vehicles being termed as the digital communication backbone of teens daily lives (Lenhart,
Madden, & Hitlin, 2005), this greater digital connectivity has lead to the emergence of the
cyberbullying phenomenon. This has thus compelled many countries to look into ways to deal
with the rise of cyberbullying (Kowalski, Limber, & Agatston, 2008).
Since most studies are done in America, more research needs to be carried out to understand the
issue of cyberbullying in Singapore. Moreover, interviews with experts on this matter also
reemphasized the lack of research done here (Appendix B).
1
Social marketing has intrigued and interested many academic marketers in many aspects, mostly
by the way it uses traditional commercial marketing techniques to help influence change in
behaviours of society. Its main aim is to sell ideas, behaviours and attitudes with the primary
beneficiary being society.
With the general acceptance of social marketing in our society today, social marketing
techniques are extensively used in international health programmes to tackle various social
problems such as tobacco use and littering.
Hence, social marketing can be seen as a solution to cyberbullying. With some initiatives already
done to address this issue, one such being an online Bully-free campaign (Singapore Children's
Society, 2012) by the Singapore Childrens Society, there is potential for social marketing to
play a bigger role to reduce cyberbullying. This study seeks to examine cyberbullying through
the lens of social marketing. As there is a lack of research data on cyberbullying, there is a
pertinent need to study cyberbullying in Singapore before social marketing can be used as a
solution to effectively tackle this issue.
1.2
Research Questions
With the lack of information on cyberbullying in Singapore, this study aims to study the current
cyberbullying situation in Singapore. It hopes to shed light on certain insights about the
behaviours, attitudes and motivations Singapore youths have towards cyberbullying, as well as to
gather insights regarding social marketing strategies that will be effective to the target audience.
Hence, this study aims to address the following questions:
1. What is the typical profile of a cyberbully/victim of cyberbullying?
2. What behaviors and attitudes do youths exhibit that make them more prone to
carrying out/falling victim to acts of cyberbullying?
3. What are the common types of cyberbullying behaviours committed in Singapore?
4. What are the motivations behind cyberbullying in Singapore?
5. How do youths in Singapore respond to acts of cyberbullying?
6. What are the social marketing strategies that will be effective in addressing
cyberbullying issues among youths in Singapore?
1.3
Research Objectives
With the research questions formed, this research aims to achieve the following research
objectives:
1. To find out the current state of cyberbullying among youths in Singapore.
2. To study and evaluate the effects of cyberbullying on youth victims in Singapore.
3. To assess the motivations of youth cyber bullies in Singapore.
4. To investigate the barriers and competitive behaviours to the adoption of noncyberbullying behaviours.
5. To recommend social marketing strategies to combat cyberbullying among youths in
Singapore.
1.4
Significance of Study
The findings will interest two main groups of institutions, and the wider community.
Non-profit organizations, such as Melrose Home, a philanthropic organizations for youths (The
Children's Aid Society, 2009), will benefit as preventive measures against cyberbullying and
strategies to deal with cyberbullying incidents recommended in this study can be looked into and
implemented to ensure a safer Internet environment. The Singapore Childrens Society will also
find the insights useful in improving their current and future campaigns.
Furthermore, government ministries such as the Ministry of Community, Youths and Sports
(MCYS) and Ministry of Education (MOE) will benefit from a more in-depth understanding of
cyberbullying. This will allow such organizations to create more effective measures and policies.
Finally, this research will interest stakeholders such as social media sites and educators. Being
the final gatekeepers, they have the ability to prevent cyberbullying, evident recently in the
change of privacy settings on Facebook, which eliminated the problems of spiteful tagging of
images, commonly used by cyber bullies (BBC, 2011).
1.5
Due to resource constraints, such as financial and time restrictions, this research study is focused
on youths working or studying in Singapore between the ages of 17 years to 34 years old as it
allows data to be gathered from the population that are both studying and working, allowing for
meaningful comparison and analyses.
Cyberbullying through the internet will entail through the means of mobile phone applications,
instant messaging tools and social media platforms.
1.6
Organization of paper
Chapter one gives an overview of the research, including the research questions and objectives
and benefits that this study can bring. Chapter two features the review of literature and insights
obtained of the social issue at hand. Chapter three touches on the methodology used to conduct
the research, including the research approach, research design, data collection method, sampling
design, analysis to be employed and finally concludes with ethical considerations. Chapter four
documents the results of this study and lastly, chapter five sums up the research analyses, as well
as the proposed recommendations and limitations of this study.
2. LITERATURE REVIEW
2.1
Cyberbullying
As cyberbullying is a fairly new phenomenon, a singular and uniform conceptualization does not
exist for it currently. According to Hinduja and Patchin, cyberbullying can be defined as the
willful and repeated harm inflicted through the use of computers, cell phones and other
electronic devices (Hinduja & Patchin, 1978), while Kowalski and Limber defined
cyberbullying as bullying through email, instant messaging, in a chat room, on a website, or
through digital messages or images sent through to a cell phone (Kowalski & Limber, 2007).
Some studies have shown cyberbullying to be an extension of traditional bullying (Raskauskas &
Stoltz, 2007), and that there were overlaps between both forms of bullying. However, in a 2007
study, the authors cautioned that these overlaps were not as significant as suggested, with
cyberbullying having several differing characteristics (Ybarra, Espelage, & Mitchell, 2007).
Greene suggested that cyberbullying contravenes several inherent assumptions of traditional
bullying (Greene, 2006). In traditional bullying, the victim usually knows the identity of the
bully, while cyberbullying allows the bully to go anonymous. Ybarra and Mitchell found that
while 84% of cyberbullying perpetrators knew their victims, only 31% of the victims knew who
their bullies were (Ybarra & Mitchell, 2004). This anonymity provides a sense of safety and
reduces the fear of being apprehended. Also, while in traditional bullying, the power imbalance
between the victim and the perpetrator refers to the difference in physical strength or social
status, in cyberbullying the power that the perpetrator holds is likely to come from computer
literacy and proficiency (Hinduja & Patchin, 2007). Also, there are some psychosocial
behaviours that are thought to be associated with cyberbullying such as a perceived lack of
support from peers, below average school grades as well as an approval of traditional bullying
(Williams & Guerra, 2007).
Thus, it can be seen that while traditional bullying and cyberbullying share some similar
characteristics, cyberbullying is unique in several ways. Vandebosch and Cleemput (2009)
compared the different forms of traditional bullying and cyberbullying according to direct and
indirect forms of bullying (Table 1).
Table 1: A Comparison between Traditional Bullying and Cyberbullying
(Singapore Polytechnic, 2011). Some other acts of cyberbullying encountered include being
insulted online, such as in a case where a primary three girl was insulted in blogs, with
comments such as ugly and irritating made about her by her classmates (Digital Life, 2008).
Other forms of indirect cyberbullying can include having personal information disclosed in
forums online, which was what happened to Mr. Gerald Chen when he wrote a letter to the
Straits Time complaining about The Coffee Bean and Tea Leaf staff switching off the power
supply when he was charging his laptop. Because of this, he was insulted on an online forum,
and had his blog address posted online which led to further attacks until he restricted the
accessibility to his online blog (my paper, 2008).
2.1.1 Causes of Cyberbullying
Studies have shown that youths tend to make their personal and private information available
online, through social networking sites or blogs. This complex and interactive Internet use will
make them prone to acts of cyberbullying, cyberstalking as well as online harassment (Schrock
& Boyd, 2008). A 2010 study carried out in Singapore found that 33.6% of youths revealed their
personal information to strangers on social networking sites, as compared to 46.1% who revealed
the same information to parents. Out of those who revealed their information to strangers, 33.1%
withheld the same information from parents. 94.3% of youths were also found to disclose their
real names online, and 74.2% of them post their photos online. Furthermore, 62.1% of youths
who had been impersonated online did not have the practice of changing their passwords yearly
(Singapore Polytechnic, 2011). This then may show that unsafe Internet usage can lead to their
private information being compromised. The results of a study carried out by Ybarra, Espelage
and Mitchell (2007) also concluded that such risky Internet behaviour led to online harassment
and sexual solicitation.
Reactive coping
This refers to taking action after being cyberbullied. The four main strategies listed in this
category were: avoidance, acceptance, justification and seeking social support. Avoidance
appeared to be highly popular, with 18 out of 20 respondents utilizing this method, through
blocking the offender, or deleting the offending message or email (Hinduja & Patchin, 2007).
Some deleted their online accounts or blocked numbers/users.
Acceptance refers to recognizing that cyberbullying is inevitable. Most respondents who chose
acceptance felt that cyberbullying was part of the virtual world, and that most cyberbullying acts
were not permanent (Parris, Varjas, Meyers, & Cutts, 2011). Also, there was no way to stop or
prevent cyberbullying. 45% report using the strategy of justification by establishing reasons why
they should not let cyberbullying affect them. Some students said that they could not be bothered
by people who had the inability to face up to them in person. Also, students chose to focus on the
negative qualities of bullies.
Seeking social support was another method used by teens which involved talking to their friends,
family or school authorities to seek advice on how to deal with the cyber bully, as well as to have
a figure of authority step in. However, most students were reluctant to approach adults, as they
would be seen as telling tales and they felt that adults were unlikely to be able to help in such
situations (Slonje & Smith, 2008). The victims were also unwilling to break the code of silence
and report the bullying (Li, 2006), with some fearful of retaliation. A study by Hoff and Mitchell
(2009) concluded that participants in their study were more likely to approach their parents as
they felt that school authorities would not take them seriously, or would cause them
embarrassment by making the incident public.
10
Preventive coping
This refers to taking actions that would decrease the probability of falling victim to
cyberbullying. 60% of students in the same study carried out by Parris, Varjas, Meyers & Cutts
(2011) suggested that communication be done in person to reduce misunderstandings. Also, all
20 students suggested that increasing online security and safety would decrease the chances of
cyberbullying. These included choosing a secure password, not divulging personal information
online as well as being aware of situations which could lead to cyberbullying. Some also said
that being more aware of what cyberbullying is would help to prevent cyberbullying.
In Singapore, concerned parents and educators have raised the question of using legislation to
deal with cyberbullying. Mr Gilbert Goh, a trained psychologist and founder of the Dont
Cyberbully website, which is aimed at providing education and information on cyberbullying in
Singapore, stated in an interview (Appendix A) that there is a lack of punitive measures to keep
youths from cyberbullying and that cyberbullying crimes are seldom publicized. However, in
2009, then Minister for Home Affairs, Mr Wong Kan Seng said that while there were no specific
rules to address the issue of cyberbullying, there was no immunity for acts conducted via the
Internet and that cyber bullies were liable to be dealt with by laws concerning criminal acts such
as criminal intimidation and insulting the modesty of a woman. He also emphasized on the need
for education and raising awareness of cyberbullying to act as prevention methods instead of
focusing on reactive methods (The Straits Times, 2009). In 2010, it was reported that the
government had set aside S$10 million dollars in funds to be distributed over five years for
projects that promote safe and responsible Internet use and cyber-wellness, as well as preventing
cyberbullying. This was in response to the spate of cyberbullying acts and misuse of Internet
resources in recent years (AFP, 2010).
11
Lastly, some students also reported that there was no way to prevent or deal with cyberbullying
as cyber bullies were more likely than not able to get away with their acts, due to the nature of
anonymity in the virtual world. Also, they cited that the actions of adults to limit or change
technology (limiting access to websites) were likely to be ineffective as there would always be
methods to bypass them (Parris, Varjas, Meyers, & Cutts, 2011).
The study then came up with a transactional model of coping mechanisms, adapted from Lazurus
and Folkmans model in 1984, to specially deal with cyberbullying (Parris, Varjas, Meyers, &
Cutts, 2011).
Figure 1: Transactional Model Adaptive for Reactive Coping
12
Social Marketing
Social marketing is defined as the process that applies marketing principles and techniques to
create, communicate, and deliver value in order to influence target audience behaviours that
benefit society as well as the target audience (Kotler & Lee, 2008).
Social marketing, just like commercial marketing, essentially utilizes the 4Ps (Product, Place,
Price, Promotion). However, instead of financial gains, a social marketer aims to sell a desired
13
behaviour and hopes to get societal gains. Also, just like a commercial marketer, a social
marketer faces competition too, namely the customers preferred and current behaviours, and
companies who are selling behaviours that are competing with the proposed behaviour.
Increasingly, social marketing techniques have been used to address public health and social
issues (Lefebvre, 2011). It involves a long process of first raising awareness of the issue,
changing the target segments beliefs and attitudes, before attempting to sell the desired
behaviour (Figure 3).
Figure 3: The Integrated Social Marketing Idea
14
1. Barriers internal or external factors that are obstructing the target market from
adopting the targeted behaviours. For example, a study done on public safety in
Canada found that barriers included psychological beliefs that reduced vigilance and
lack of public awareness for emergency information (Mintz & Theresa, 2007).
2. Benefits things that the target market wants or needs and hence the targeted
behaviour should have the potential to provide them. For example, a survey done by
Americas Blood Centres in May 2001 revealed that 34% perceived wanting to help
others as the major benefit associated to blood donation.
3. Competition behaviours that the target audience will prefer over the target
behaviour, or are already a habit to them that they will have to give up or anyone who
advocates for behaviours that oppose desired behaviours.
2.2.2 Product
Product is anything that can be offered to a market to satisfy a want or need (Kotler & Lee,
2008). Three product levels are usually involved, namely the core product, actual product and
augmented product.
The core product refers to the fundamental benefits that are expected to be obtained in exchange
for practising the desired behaviour, and in this study, will refer to an environment freed of
cyberbullying incidents. Actual product refers to a particular behaviour that is promoted (eg. to
stop cyberbullying).
The augmented product includes any physical items and services that will be promoted along
with the behaviour that is to be sold to act as an encouragement, to lower the impediment to
15
adopting the behaviour and to sustain behaviour. Services can be categorized into educationrelated, personal, counselling, clinical and community services. An example will be the Bullyfree campaign organized by the Singapore Childrens Society which includes an informative
website containing essential information on cyberbullying, coupled with counselling services via
helplines and email addresses (Singapore Children's Society, 2012).
2.2.3 Pricing
Price is the cost that the target market associates with adopting the desired behaviour (Kotler
& Lee, 2008). It can broadly be categorized into monetary, where the target audience has to
sacrifice money to purchase tangible objects or services in exchange for the desired behaviour, or
non-monetary which refers to the intangibles such as time and psychological risks. For example,
a study conducted by the Singapore Health Promotion Board revealed that its Healthier
Restaurant Program was an effective marketing strategy whereby Singaporeans beliefs and
behaviours were changed due to the provision of facilitating mechanisms to make it more
convenient for consumers to make healthier food decision (Karuppiah & Seah, 2007).
2.2.4 Place
Place refers to where and when the target market will perform the desired behaviour, acquire
any related tangible objects and receive any associated services (Kotler & Lee, 2008). This is of
utmost importance as the target audience will assess the accessibility and degree of convenience
of these social products when deciding whether to adopt the desired behaviour. In Singapore,
there are various services provided for both cyber victims and bullies who may be struggling to
put their cyberbullying behaviours to a stop. Other than the Bully-free website that was set up
by the Singapore Children Society, there are various other places where help and counselling
services can be obtained. For example, DontCyberbully.com, an educational support website,
16
allows the public to report cases, seek advices, as well as gather more insights and understanding
on cyberbullying (DontCyberbully.com, 2010).
2.2.5 Promotion
Promotions are persuasive communications designed and delivered to inspire your target
audience into actions (Kotler & Lee, 2008). Planning the promotion part of a social campaign
usually involves decisions for the messages, the messengers, the creative strategy, as well as the
communication channels.
The message of a social campaign should include specific and simple actions that are easily
comprehended by the target audience. Message should include facts such as harmful impacts of
their current behaviours and the benefits of the desired behaviours. In general, the attractiveness
of the message source depends on three main factors expertise, trustworthiness as well as
likeability. Experts, who possess the perceived knowledge to support the claim, are crucial in
injecting credibility into the campaign. The message source should ideally be perceived as
objective to increase its trustworthiness and possess charisma to increase its likeability.
Traditional media channels often involve advertising (using the television, radio, newspapers,
magazines and mail), public relations and special events, printed materials, special promotional
items and lastly signage and displays. With the explosion of new technology, non-traditional
media channels are increasingly leveraged to obtain a more effective reach of the target audience.
Non-traditional media channels include entertainment media (like movies, comic books and
video games), public art, product integration, social media, websites and mobile phones. An
example of social marketing using entertainment media will be the movie Cyberbullying that
was aired on ABC Family in July 2011. In partnership with Seventeen magazines, ABC Family
17
aimed to increase the awareness on the issue of digital youth abuse by educating viewers on the
forms that cyberbullying can take, the consequences and resources necessary for readers to reach
out for help (Cambio, 2011).
18
3. METHODOLOGY
3.1
Research Approach
Based on literature review conducted, a survey questionnaire was constructed to obtain a large
number of responses from the population in regards to various aspects of cyberbullying and
social marketing strategies. A pre-test was launched to ensure face validity of the questionnaire
before the actual survey was carried out. Analyses were then performed to obtain meaningful
insights from the raw data.
3.2
Research Design
Exploratory research was conducted by interviewing two experts to obtain a better understanding
of the cyberbullying scene in Singapore due to limited secondary resources. Descriptive research,
in the form of a survey then followed to identify the characteristics and attitudes associated to
cyberbullying and social marketing strategies.
3.3
Term
Definition
Cyberbullying
The wilful and repeated harm inflicted through email, instant messaging, in a
chat room, on a website, or through digital messages or images sent through
to a cell phone.
Social marketing
Youths
People between the age of 17 years old to 34 years old who are either
studying or working full time in Singapore.
Cell phone
applications
application. Examples are the Short Message Service (SMS) and third-party
applications such as Whatsapp Messenger, Blackberry Messenger (BBM)
and other similar applications possessing such functions.
Direct
Direct cyberbullying behaviours are those that occur directly to the victim.
Cyberbullying
Behaviours
Indirect
Indirect cyberbullying behaviours are those that do not occur directly to the
Cyberbullying
victim, but may still cause harm to the victim. Examples include: Being
Behaviours
excluded from a group and being the target of gossip through the Internet or
mobile phone, and defamatory polls.
20
3.3.3 Hypotheses
From the literature review conducted, various different factors possibly associated to
cyberbullying were obtained and the possible differences in cyberbullying behaviours between
gender and age groups were raised. Thus, to investigate the possible correlations and any
possible differences, the following hypotheses were developed:
H1
The higher the approval of traditional bullying, the higher the possibility of exhibiting
cyberbullying behaviours.
H2
The higher the Internet competency, the higher the possibility of exhibiting
cyberbullying behaviours.
H3
H4
The greater the amount of risky Internet behaviours one engages in, the higher the
possibility that one becomes a victim of cyberbullying.
H5
Males exhibit more cyberbullying behaviours and are more likely to be victims of
cyberbullying as compared to females.
H6
The higher the number of hours spent on the Internet, the higher the possibility of
exhibiting cyberbullying behaviours and being a victim of cyberbullying.
H7
H8
There is a significant difference between the two age groups (17-25 years old vs 26-34
years old) in regards to the methods employed to deal with cyberbullying incidents.
web address of the pre-test survey was posted on Facebook through an event page and the first
ten respondents who responded were chosen. It was conducted from 26 January 2012 to 29
January 2012. Opinions and comments were gathered (Appendix D) and the questionnaire was
modified before the actual survey was carried out.
3.4
The actual survey was hosted on Qualtrics.com to obtain a large number of responses from the
Singapore population between 17 years to 34 years old. The web address of the online selfadministered questionnaire was distributed to individuals in the teams network of friends from
30 January 2012 to 23 February 2012, through an event page created on Facebook and personal
emails sent to them.
An online self-administered survey method was chosen to lower the costs as well as broaden the
coverage of the questionnaire. It also provided the respondents with greater convenience as they
could complete these questions on their available time. This method also eliminated interviewer
apprehension, which could affect the accuracy and response rate.
Utilizing an online self-administered questionnaire would mean that that interviewers were not
physically present to answer queries or clear the doubts of the respondents; hence this might
have resulted in respondents filling in answers inaccurately due to misunderstanding of questions.
However, to mitigate this error, an email address was provided to allow respondents to send in
enquiries and they were also encouraged to quit the survey and await our replies before
attempting the survey again. However, no enquiries were received.
The finalized survey questionnaire consisted of a cover letter and the following six sections
(Appendix E).
22
Sections of questionnaire
Cover letter
Section I:
Profiling of usage of Internet and were in the following areas such as cell phones applications,
communication tools
Section II:
23
cyberbullying
Section IV:
Competition,
Benefits
Section V:
24
Demographic Profiling
3.5
Sampling Design
25
26
3.5.4 Limitations
Due to the exclusion of youths under 17 for this research, one limitation of this study was the
inability to measure and compare the results from a younger age group (Primary and Secondary
School students) against an older age group to evaluate differences in the understanding and
behaviours of both groups with regards to cyberbullying. Also, the combination of snowball
sampling and quota sampling might have resulted in an unequal distribution of the target
audience.
3.6
Data Analysis
Firstly, the data was cleaned to ensure completeness and consistency by removing incomplete
questionnaires. Thereafter, reliability (Normality and Cronbachs alpha) and validity tests (Factor
analysis) were conducted to ensure the data collected corresponded to the variables derived from
the literature review. Independent t-tests and paired sample t-tests were done to compare means
of cyberbullying behaviours and preference of social marketing strategies. Furthermore, Chisquare and correlation tests were done to compare how different demographics, hours spent
online or Internet competencies related to cyberbullying behaviours exhibited or encountered.
ANOVA test was also performed to determine if there were any significant differences between
the different groups of demographics in terms of their cyberbullying behaviours and social media
marketing preferences. For the analyses, a 95% confidence level was employed and a
significance value of 0.05 was used to test the hypotheses.
3.7
Ethical Considerations
The Code of Ethics of the Association for Institutional Research was adhered to during the
sampling to ensure the integrity and confidentiality of our survey results. A cover letter was
27
included at the start of the survey to inform the participants about the purpose and objectives of
the research, the details of the researchers, as well as the time needed to complete the survey and
also to reassure them that any data provided will be confidential and only used for the purpose of
our study. No personal data that could identify the individual respondents were collected, so as to
ensure their privacy and anonymity.
Data collection was also carried out with importance placed on ensuring the privacy of the
respondents and the integrity of the survey results. The data collected was stored to reasonably
prevent loss, tampering, unauthorized access or divulgence.
28
Overview
The respondents were youths aged 17 to 34 years old in Singapore. Among them 88.1% were 1725 years old while 11.9% were 26-34 years old (Figure 5). Furthermore, 48.5% of them were
males and 51.5% of them females. The breakdown between students and working adults and
classification of students according to their educational institutions are as shown below (Figure
6).
Figure 5: Breakdown of Age Groups
26-34
12%
17-25
88%
Junior
College
1%
Polytechnic
5%
ITE
1%
Working
31%
University
57%
Private
educational
institutions
4%
29
4.2
Data Cleaning
The data was checked for incompleteness, inconsistency and obvious response patterns. Also,
respondents who were not within the age group of 17-34 were excluded. Hence, after data
cleaning, a total of 294 responses remained for analysis.
Normality test was conducted to ensure the data was normally distributed. Since it was
impossible to attain a perfectly normal distribution, normality was assumed as the sample size
was greater than 30 (Appendix F: Normality Testing Figures 18-27).
Factor analysis was done to ascertain if the priori structure was valid. A KMO Bartlett test where
sphericity was greater than 0.8 at significance less than 0.05 was used to determine the structure
of the variables. The different methods of dealing with cyberbullying obtained a value of 0.713
with 0.000 significance value supporting the factors of avoidance, acceptance, seeking social
support and prevention (Appendix F: Factor Analysis Tables 2 & 3).
Cronbachs Alpha test was executed to test the internal consistency in the survey and was tested
in all the constructs. Elements in dimensions with a Cronbachs Alpha of less than 0.8 were
deleted to improve the reliability of the data.
For Internet and mobile competency, competency in forums usage was found to be inconsistent
with the other elements of Internet competencies (Appendix F: Reliability Testing Tables 4 &
5). Hence, the item was removed as the usage of forums required a different set of skills from the
usage of cell phone applications, instant messaging and social media platforms. For social
marketing barriers, the element able to express anger leading to cyberbullying was removed
from the analysis to improve the reliability of the dimensions (Appendix F: Reliability Testing
30
Tables 15 & 16). In summary, the final Cronbach Alphas achieved by the different dimensions
(close to 0.8) indicated the high reliability of the data obtained (Appendix F: Reliability Analysis
Table 18).
ANOVA tests were also performed on the different dimensions against Internet usage,
competency and demographics where for only three tests conducted, there were significant
differences in the means of the different dimensions (Internet competencies vs Religion, Indirect
Cyberbullying Behaviours Encountered vs Number of Siblings and Direct Cyberbullying
Behaviours Encountered vs Type of Housing). However, for those tests, the sample size for the
group was less than 30 and it did not provide a fair comparison of the data obtained. Hence, no
extensive conclusion could be made from the results of the tests (Appendix F: ANOVA Test
Tables 19-24).
4.3
Figure 7 below shows the level of Internet and mobile phone competency the youths in
Singapore possess. The y-axis represents the options chosen (with 1 being strongly disagree and
5 being strongly agree) by youths when answering the questions I am competent in using cell
phone applications/instant messaging/social media, with the x-axis representing the number of
respondents who had chosen the various options.
31
From the data collected, it was evident that Singapore youths possess a strong competency in
Internet usage, with the average score at 4.43 out of 5. In addition, 36.2% of respondents rated
themselves a full 5 out of 5 for the combined competencies (Appendix G Table 25).
Furthermore, youths in Singapore spent an average of 2-7 hours on the Internet daily, with the
majority of 39.6% spending 2-4 hours online. In addition, 24% of teenagers spent more than
seven hours on the Internet daily, with only 7.8% spending less than two hours on the Internet
daily (Appendix G Table 26).
Figure 8: Frequency for Risky Internet Behaviours
32
Figure 8 shows the frequency for risky Internet Behaviours in youths in Singapore. The y-axis
shows the options (with 1 being strongly disagree and 5 being strongly agree) chosen for the
questions in the section by the respondents. The x-axis shows the number of respondents who
chose each option. Youths were less likely to engage in risky Internet behaviours, with 95%
scoring a 3 and below out of 5. 61.4% of youths also disagreed that they felt safe while engaging
in risky Internet behaviours such as disclosing their passwords to strangers online and revealing
personal information that could be viewed by strangers online (Appendix G Table 27).
4.4
Cyberbullying Behaviours
4.4.2 Cyberbullying
A mean of 1.44 was obtained, indicating that respondents typically had exhibited some sort of
cyberbullying behaviours over the past 1 year (Figure 10). However, the low mean showed that
33
Singapore youths engaged in very low level of cyberbullying. Nevertheless, there was a need to
take into account response bias as the team felt that due to the nature of the negative behaviours
listed, respondents might have a tendency to select the choices that appear to be morally right.
This could lead to a misrepresentation of the actual level of cyberbullying activities that youths
in Singapore engage in.
Figure 10: Frequency for Cyberbullying Behaviours Exhibited by Youths in Singapore
Among Singapore youths, the cyberbullying behaviours most commonly exhibited were indirect
cyberbullying behaviours, such as excluding someone from a group and spreading gossip
through the mobile phone, with both having a mean of over 1.7, as illustrated in Figure 11.
Disclosing private information online was also another behaviour more commonly encountered,
with a mean of 1.64. This agreed with the findings in the literature review, with youths in
Singapore reporting that the second most common form of cyberbullying encountered being
having their photos and/or videos posted online without their permission. The direct
cyberbullying behaviour most commonly engaged in by Singapore youths was insulting someone
34
online, with a mean of 1.49 while the cyberbullying behaviour least exhibited by youths
appeared to be threatening someone online, with a mean of 1.15.
Figure 11: Means of the Different Cyberbullying Behaviours Exhibited by Singapore
Youths
1.9
1.8
1.7816
1.7270
1.6416
1.7
1.6
1.5222
1.4881
1.5
1.3891
1.4
1.3003
1.3
1.2
1.2082
1.1536
1.1
1
Cyberbullying behaviours exhibited
Threatened someone
Insulted someone
Figure 12 below illustrates the means of the cyberbullying behaviours encountered by youths in
Singapore. Singapore youths reported the most common cyberbullying behaviour encountered to
be having had their private information disclosed online, with a mean of 1.75. Other common
cyberbullying behaviours experienced included being the target of gossip through mobile phone,
having been deceived, being excluded from a group and having been insulted online. Being the
target of defamatory polls was the cyberbullying behaviour least experienced by Singaporean
youths, with a mean of 1.08.
35
1.8
1.7
1.6
1.5
1.4027 1.4232
1.4
1.3
1.4642
1.4369
1.3823
1.3106
1.2150
1.2
1.0785
1.1
1
Been insulted
Been decieved
H1: The higher the approval of traditional bullying, the higher the possibility of exhibiting
cyberbullying behaviours.
A chi-square test was done to determine if a correlation existed between approval of traditional
bullying and engaging in cyberbullying behaviours. However, with a significance value of 0.217
(Appendix H Table 29), the result showed that there was no significant correlation between the
two. While the literature review showed a correlation between the two, this was not the case for
youths in Singapore, and the difference may be due to the fact that youths in Singapore are less
likely to engage in and approve of traditional bullying, even if they engage in cyberbullying.
36
H2: The higher the Internet competency, the higher the possibility of exhibiting
cyberbullying behaviours.
To establish if a higher level of Internet competency is correlated to Singapore youths engaging
in more cyberbullying activities, a chi-square test was performed to test for the existence of a
correlation between the two. With a significance of 0.001 (Appendix H Table 30), the result
showed that there existed a correlation, and it could be proven that the more competent
Singapore youths were with regards to the Internet, the higher the possibility that they would
engage in cyberbullying activities. This agreed with the literature review carried out previously,
showing that the power imbalance that exists in cyberbullying is likely to come from the
difference in Internet competency between bullies and victims, and that it is likely a cause of
why they chose to engage in cyberbullying over traditional bullying.
H3: Singapore youths exhibit more indirect cyberbullying behaviours than direct
cyberbullying behaviours.
To determine if Singapore youths exhibit indirect cyberbullying activities more commonly than
direct cyberbullying activities, a paired samples t-test was carried out. The results showed that
there was a significant difference between the means for direct cyberbullying behaviours
exhibited and indirect cyberbullying behaviours exhibited as the significance value is 0.000
(Appendix H Table 31). Thus, it proved that Singapore youths exhibited more indirect
cyberbullying behaviours as compared to direct cyberbullying behaviours.
With a mean of 1.41, this indicated that, on the average, respondents had been on the receiving
end of some sort of cyberbullying behaviours though frequency of such encounters was rare
(Figure 13). However, there was again the need to take into account response bias and social
37
H4: The greater the amount of risky Internet behaviours engaged in, the higher the
possibility that one becomes a victim of cyberbullying.
To test the existence of a correlation between youths in Singapore engaging in risky Internet
behaviours and encountering cyberbullying, a chi-square test was performed. With a significant
value of 0.140, the result indicated that there was no correlation present (Appendix H Table 32),
and thus engaging in risky Internet behaviour would not result in a higher possibility of
encountering cyberbullying. This contradicted the findings in the literature review and may be
due to the existence of response bias as the respondents may tend to rate lower values for
cyberbullying behaviours encountered than there actually is. This could be have been caused by
respondents who tried to give the correct answer instead of according to their true experiences.
38
H5: Males exhibit more cyberbullying behaviours and are more likely to be victims of
cyberbullying as compared to females.
An independent t-test was performed to ascertain if male Singapore youths exhibited and were
on the receiving end of cyberbullying behaviours more than female Singapore youths. With
significance levels at 0.033 and 0.022 respectively for cyberbullying behaviours engaged in and
encountered (Appendix H Table 33), it could be proven that male Singapore youths did engage
in and encountered more cyberbullying activities than their female counterparts. The literature
review findings were inconclusive on gender differences in cyberbullying, and the results of this
study went towards showing that gender differences exist in the case of youths in Singapore.
H6: The higher the number of hours spent on the Internet, the higher the possibility of
exhibiting cyberbullying behaviours and being a victim of cyberbullying.
To establish if there was a correlation between the number of hours spent on the Internet and the
possibility of cyberbullying behaviours being exhibited by Singapore youths, a chi-square test
was carried out. The significance value is 0.792 (Appendix H Table 34), and thus it could not
be proven that the more time Singapore youths spent on the Internet, the higher the possibility of
exhibiting cyberbullying activities.
A chi-square test was performed to test if there was a correlation between the number of hours
spent on the Internet and the level of cyberbullying behaviours encountered by Singapore youths.
With a significance value of 0.202 (Appendix H Table 35), the results showed that there was
no significant correlation between the two. Thus, it could not be proven that the more time
Singapore youths spend on the Internet, the higher the possibility of being on the receiving end
of cyberbullying behaviours.
39
4.5
Looking at how Singapore youths deal with cyberbullying, it was evident that the two most
popular methods of dealing with cyberbullying were prevention and avoidance. As seen from
Figure 14 below, seeking social support appeared to be the least popular method, with a score of
2.78. This result agreed with the findings in the literature review, suggesting that youths in
Singapore were also least likely to approach friends, family members or the authority when faced
with cyberbullying.
Figure 14: Means for Methods used to Deal with Cyberbullying
4.3
4.0922
4.1
3.9
3.7
3.8549
3.5711
Avoidance
3.5
Acceptance
3.3
Social Support
3.1
Prevention
2.9
2.7782
2.7
2.5
H7: Prevention is the most preferred method to deal with cyberbullying incidents.
To establish if there was a strong preference for dealing with cyberbullying through prevention
over avoidance methods, a paired samples t-test was performed. The mean scores for dealing
with cyberbullying through avoidance, acceptance, seeking social support and preventive
methods were 3.85, 3.57, 2.78 and 4.09 respectively. These results indicated that there was a
difference between the means and thus, it could be concluded that youths in Singapore had a
clear preference of using preventive methods to handle cyberbullying (Appendix I Table 36).
40
The results supported previous literature review findings, which stated that youths preferred to
prevent themselves from falling victim to cyberbullying by practicing safe internet usage.
Examples of such practices include being careful with their personal information by not
revealing them to strangers be it through a social website or an online chat.
H8: There is a significant difference between the two age groups (17-25 years old vs 26-34
years old) in regards to the methods employed to deal with cyberbullying incidents.
To see if there was a significant difference in the preferences in methods employed to deal with
cyberbullying between the age groups 17-25 and 26-34, an independent t-test was carried out
(Appendix I Table 37). From the results shown, the significance levels for dealing with
cyberbullying using the different methods were all above 0.05, thus there appeared to be no
significant differences between the two age groups and both age groups in general did not differ
on the different methods employed to deal with cyberbullying.
4.6
4.6.1 Barriers
The ability to cyberbully with anonymity had the highest average mean of 4.33 (Figure 15) out
of 5. It was discovered that there was a significant difference between the ability to cyberbully
with anonymity and the lack of knowledge on cyberbullying behaviours, indicating that
respondents felt that the ability to cyberbully with anonymity was the most likely reason that led
to cyberbullying (Appendix J Table 38).
41
4.4
4.2
4
3.8
3.6
Anonymity
3.4300 3.4471
3.4
3.2
3.9625
3.95
3.9
Peer pressure
3.85
3.8
3.75
Fulfilling egoistic
purposes
3.7065
3.7
3.65
3.6
4.6.3 Benefits
Out of the five options given for benefits that might motivate an individual to stop cyberbullying,
new technology that may track users, as well as punishments such as fines and social ostracism,
proved to be the top two motivations with average means of 3.95 and 3.84 respectively (Figure
42
17). However, there was no significance difference between them as shown from the paired
sample t-tests (Appendix J Table 40).
Figure 17: Means of Benefits that will Motivate Individuals not to Cyberbully
3.9522
4
3.9
3.8942
Not wanting to be
cyberbullied
Knowing harm to victims
3.8
3.7
3.6
3.5
3.4
3.3
3.4846
3.3891
3.2423
3.2
3.1
3
4.7
4.7.1 Product
Comparing among these three products, 73.7% of the respondents strongly agreed or agreed that
counsellors that were trained in dealing with cyberbullying issues would help address
cyberbullying incidents, as compared to 65.9% of the respondents and 52.3% of the respondents
who strongly agreed or agreed that dedicated websites and helplines could help address this
social problem (Appendix K Tables 41-43). A paired sample test revealed with a significance
value of 0.02, respondents preferred having counsellors over a dedicated website as the
campaign product (Appendix K Table 44).
4.7.2 Price
Out of the three social marketing prices, 79.1% of the respondents strongly agreed or agreed that
punishment in the form of shame from publishing the incident online or in the newspaper would
43
deter an individual from cyberbullying, as opposed to 77.1% for fines and 72.6% for
rehabilitative classes (Appendix K Tables 45-47). However, there was no significant difference
between the choices of fines and punishments as the significance value was above 0.05
(Appendix K Table 48).
4.7.3 Place
Results revealed that help obtained from Internet (online) and at home were the two more
popular places, with 58% and 52.6% respondents either strongly agreeing or agreeing to seek
help from online channels such as helplines, websites and forums and at home from their
families members respectively. Only 37.8% and 18.8% chose schools and community centres
(Appendix K Tables 49-52). However, a paired sample test revealed that, there was no
significant differences between seeking help from online channels and at home (Appendix K
Table 53).
4.7.4 Promotions
Personal recount was the most popular strategy with 81.6% of the respondents strongly agreeing
or agreeing that personal recount would be the most effective promotional tool for an anticyberbullying campaign, as compared to 67.2% of the respondents who strongly agreed or
agreed that psychologist opinions was an effective promotional tool (Appendix K Tables 5456). This difference was further supported by the paired sample test (Appendix K Table 57)
which revealed that respondents significantly preferred personal recount of cyberbullying
incidents over psychologist opinions with a significance value of less than 0.05.
For promotional channels, the top three choices by the respondents were social media, followed
by entertainment media and advertising. 86.7% of the respondents strongly agreed and agreed
44
that social media, such as Facebook and Twitter, would be effective in promoting anticyberbullying campaigns, whereas only 78.1% and 75.7% strongly agreed or agreed that
entertainment media, such as movies, and advertising, such as on television and radio were
effective promotional tools (Appendix K Table 58-65). Comparing the top two choices of
social media and entertainment media, a significance value of less than 0.05 was obtained,
indicating that respondents significantly preferred social media over entertainment media
(Appendix K Table 66).
45
Recommendation
Youths in Singapore typically exhibit a low level of cyberbullying behaviours. However, the
results showed that Singaporean youths did exhibit more indirect cyberbullying behaviours than
direct cyberbullying behaviours. Thus, there may be a need for schools and organizations to first
establish what cyberbullying behaviours are, and how they are classified into direct and indirect
cyberbullying before educating youths on such behaviours. Next, they should also emphasize on
the harm that indirect cyberbullying can cause, and how youths can protect themselves from
falling victim to such forms of cyberbullying.
A correlation between Internet competency and engaging in cyberbullying activities also existed
in Singapore youths, which highlights the need for schools and organizations to further carry out
programmes on cyber-wellness, and to provide a holistic approach in the education of youths on
Internet and computer skills.
Preventive methods had also been shown to be the most popular approach youths would take to
deal with cyberbullying. Schools and organizations should then incorporate the education of such
methods, such as the importance of keeping personal information private, as well as
communicating in person, to youths in cyber-wellness programmes. Parents should also be
educated on how to monitor their childrens activities online to ensure a safe Internet
environment for them.
Youths felt that seeking social support when cyberbullied was ineffective, and this may have to
do with the lack of available channels for them to seek help through. They may also feel that
schools and parents may not be able to help them in such cases as there is little that authorities
46
can do to stop cyberbullying, due to the lack of punitive laws against cyberbullying in Singapore.
Furthermore, they may be fearful of making the incident public, which will bring about greater
embarrassment to themselves. Schools should voice out on their stand on cyberbullying, and
convey to students how they can help victims, along with the promise of confidentiality. This
may then encourage youths to have more confidence in seeking help from schools and other
organizations. These organizations should also aim to educate parents on identifying
cyberbullying, and how to help their children if they fall victim to cyberbullying. By doing so, a
strong network of support can be provided for the victims of cyberbullying.
The ability to cyberbully with anonymity had proven to be the barrier that acted as an
impediment to the adoption of non-cyberbullying behaviours. Hence, governmental and nonprofit organizations, schools and relevant stakeholders can potentially reduce cyberbullying
cases by imposing new rules for users to reveal particulars such as real name or school on social
networking sites so as to reduce their anonymity.
Results have also shown that counsellors continued to play a pertinent role in addressing
cyberbullying incidents. On top of the cyber wellness websites and help lines that are currently
available, community centres, non-profit organizations, as well as schools should continue to
train their pool of counsellors to deal with cyberbullying incidents and clearly convey to its
target audience the different ways that they can use to reach these counsellors. Mr. Gilbert Goh
also suggested greater collaboration between authorities and school via forums or community
talks to provide a more integrated strategy to tackle cyberbullying (Appendix B-1).
In addition, personal recount of past cyberbullying incidents by victims was shown to be an
effective anti-cyberbullying campaign message strategy. Hence, such a message strategy is
47
Limitations of Study
Limitations of this research study included having too small a sample size. Obtaining a sample
size of 294 respondents might not be sufficient for an accurate reflection of the entire target
population, and a larger sample size must be obtained to reflect more accurate trends in the target
population.
As this study utilized non-probability sampling where selection was not based on fairness, equity
or equal chance, the target sample obtained for this research might be a weak representative of
the target population. As snowballing sampling was used to obtain the responses of these
respondents, members of the target audience who were not within the social network would have
a lower probability of being selected.
Moreover, due to the sensitive nature of some of the questions, this might cause response bias, in
which respondents answer questions with a certain slant that might have misrepresented the truth.
48
Also, questions that ask for their attitudes on traditional bullying, might have triggered social
desirability bias, causing respondents to choose options that would allow them to appear socially
desirable at the point of time, which might not be truthful.
49
6. CONCLUSION
This study contributes to the literature on cyberbullying in youths in Singapore by offering
various insights. Firstly, it was discovered that the majority of youths do engage in mostly the
indirect form of cyberbullying, though the level of frequency is low. Secondly, preventive
methods are likely to be adopted by youths if faced with cyberbullying incidents, while social
support is the least likely approach, reflecting a possible lack of confidence in schools and
authorities. Thirdly, this study has achieved insights in possible effective social marketing
strategies that can be used in Singapore. This study has shown that counsellors continue to play
an important in tackling cyberbullying, due to their expertises and skills. Furthermore when
planning and executing an anti-cyberbullying campaign, a personal recount message strategy
through social media as a promotional tool is the most preferred way to reach Singapore youths.
Similar to any research study, this study faces certain limitations such as the usage of nonprobability sampling methods, which lowers the accuracy in the representation of the target
population. Also, response bias and social desirability bias may have occurred due to the
sensitive nature of certain questions.
All in all, information and insights obtained from this research has helped to paint a more holistic
picture of the cyberbullying scene in the Singapore youths. This study can be used as a platform
for further research to be done in the field of cyberbullying in Singapore youths, or Singapore in
general, to assist schools and organizations in understanding and combating cyberbullying, a
phenomenon that will doubtlessly continue to exist with the advent of the Internet age.
50
7. REFERENCES
Bibliography
AFP. (2010). Retrieved 30 June, 2011, from Agency France-Presse:
http://www.google.com/hostednews/afp/article/ALeqM5jrTU4vjRUNs8EclKEvm1ucwPJk
lg
Andreasen, A. R. (1994). Social Marketing: Its Definition and Domain. Journal of Public Policy
& Marketing , 13 (1), 108-114.
Bachena, C., Raphaela, C., Lynnb, K.-M., McKeec, K., & Philippid, J. (2008). Civic
Engagement, Pedagogy, and Information Technology on Web Sites for Youth. Political
Communication , Volume 25, Issue 3, Pages 290-310.
Baruch, Y. (2005). Bullying on the net: adverse behavior on e-mail and its impact. Information
& Management .
BBC. (2011). Technology. Retrieved 23 August, 2011, from BBC News:
http://www.bbc.co.uk/news/technology-14633427
Cambio, T. (13 May, 2011). Cambio. Retrieved 6 December, 2011, from Emily Osment & Kay
Panabaker Tackle Cyberbullying in New ABC Family Movie:
http://www.cambio.com/news/emily-osment-kay-panabaker-tackle-cyberbullying-in-newabc-family-movie/
Cassidy, W., Jackson, M., & Brown, K. N. (2009). Sticks and Stones Can Break My Bones, But
How Can Pixels Hurt Me? : Students' Experiences with Cyber-Bullying. School
Psychology International .
Cochran, W. G. (1977). Sampling Techniques (Third ed.).
Digital Life. (2008). Caught in Web of menace.
DontCyberbully.com. (2010). Retrieved 5 December, 2011, from http://dontcyberbully.com/
Greene, M. B. (2006). Bullying in schools: A plea for measure of human rights. Journal of
Social Issues .
Hinduja, S., & Patchin, J. W. (1978). Bullying Beyond the Schoolyard: Preventing and
Responding to Cyberbullying.
Hinduja, S., & Patchin, J. W. (2009). Bullying Beyond the Schoolyard: Preventing and
Responding to Cyberbullying.
51
Hinduja, S., & Patchin, J. W. (2007). Offline Consequences of Online Victimization: School
Violence and Delinquency. Journal of School Violence .
Hoff, D. L., & Mitchell, S. N. (2008). Cyberbullying: causes, effects, and remedies. Journal of
Educational Administration .
Huffaker, D. A., & Calvert, S. L. (2005). Gender, Identity, and Language Use in Teenage Blogs.
Journal of Computer-Mediated Communication , Vol10, Issue 2, Page 00.
Internet Usage Statistics. (2011). Retrieved from Internet World Stats:
http://www.internetworldstats.com/asia.htm#sg
Karuppiah, V., & Seah, J. (2007). Recognition and Rewards Program for healthier eating
establishment in Singapore.
Kotler, P., & Lee, N. R. (2008). Social Marketing - Influencing Behaviours for Good. United
States of America: Sage Publications.
Kowalski, R. M., & Limber, S. P. (2007). Electronic Bullying Among Middle School Students.
Journal of Adolescent Health , S22-S30.
Kowalski, R. M., Limber, S. P., & Agatston, P. W. (2008). Cyber bullying: bulllying in a digital
age.
Lefebvre, C. R. (2011). An integrative model for social marketing. Journal of Social Marketing ,
54-72.
Lenhart, A., Madden, M., & Hitlin, P. (2005). Teens and Technology. Pew Internet & American
Life Project.
Li, Q. (2006). Cyberbullying in Schools : A Research of Gender Differences. School Psychology
International .
Mintz, J. H., & Theresa, W. (2007). Is Your Family Prepared? Public Safety Canada (20062007).
my paper. (2008). Are you a victim of cyber-bullying?
Naing, L., Winn, T., & Rusli, B. N. (2006). Practical Issues in Calculating the Sample Size for
Prevalence Studies. Archives of Orofacial Sciences .
Nemours. (2009). Cyberbullying. Retrieved 30 June, 2011, from KidsHealth:
http://kidshealth.org/parent/positive/talk/cyberbullying.html
Parris, L., Varjas, K., Meyers, J., & Cutts, H. (2011). High School Students' Perceptions of
Coping With Cyberbullying. Youth & Society .
52
Raskauskas, J., & Stoltz, A. D. (2007). Involvement in Traditional and Electronic Bullying
among Adolescents. Developmental Psychology .
Schrock, A., & Boyd, D. (2008). Online Threats to Youth: Solicitation, Harassment, and
Problematic Content.
Singapore Children's Society. (2012). Bully Free Campaign. Retrieved 10 January, 2012, from
Cyberbullying: http://www.bullyfreecampaign.sg/cyber_bullying/index_cyber.php
Singapore Polytechnic. (2011). PRIVACY AND SECURITY ONLINE: DOES IT MATTER TO
YOU(TH).
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian
Journal of Psychology .
The Children's Aid Society. (2009). Melrose Home- The Children's Aid Society. Retrieved 10
January, 2012, from About Children's Aid Society:
http://www.childrensaidsociety.org.sg/cas/contents.php?page=aboutus-main
The New Paper. (2012). Undergrad asks girls to expose themselves for 'film scene'.
The Straits Times. (2009). No plans for cyber-bullying laws.
Vanderbosch, H., & Cleemput, K. V. (2009). Cyberbullying among youngsters: profiles of
bullies and victims. new media & society .
Weinreich, N. K. (1999). Hands-On Social Marketing: A Step-by-Step Guide. Thousand Oaks,
CA: Sage.
Williams, K. R., & Guerra, N. G. (2007). Prevalence and Predictors of Internet Bullying. Journal
of Adolescent Health .
Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: a
comparison of associated youth characteristics. Journal of Child Psychology and
Psychiatry .
Ybarra, M. L., Espelage, D. L., & Mitchell, K. J. (2007). The co-occurrence of Internet
harassment and unwanted sexual solicitation victimization and perpetration: Associations
with psychosocial indicators. Journal of Adolescent Health .
53
8. APPENDICES
Appendix A: Email to Request for Interview regarding Cyberbullying
Dear Sir/ Madam,
I hope this email finds you well.
We are a group of final year students from Nanyang Business School, currently embarking on
our final year project on social marketing and the issue of Cyberbullying in Singapore. This
research is supervised by Assoc Prof (Adj.) Gerard Gonzales. After some research, we have
come to know about your organizations dedicated efforts on this social issue.
We wish to have a face-to-face interview with you to know more about this social issue as we
believe that your expert views and understanding on this topic will not only provide valuable
insights for our study but also increase our understanding of Cyberbullying.
Please let me know if I can provide with any other information. My contact information appears
below. We would greatly appreciate it if you could leave us the contact details of the person we
should go to regarding Cyberbullying.
We thank you for taking the time out to read this email and we hope that you will consider our
request positively.
Have a great week ahead and we hope to hear from you soon.
Yours sincerely,
Ang Xue Ling
Koh Peck Hoon Cecilia
Soh Yiming Anders
so0001rs@e.ntu.edu.sg
Nanyang Business School
Nanyang Technological University
54
do such stuff now. Nevertheless, the last I heard is the police cant do much so the victim has to
bring the person to court using legal means.
Appendix B-2: Email interview with Singapore Childrens Society
Singapore Childrens Society
Email interview with Singapore Childrens Society
21 November 2011
1. Why did SCS embark on this campaign? When did the campaign start and how long was it
carried out for?
A group of counsellors and social workers working in the Project CABIN context observed that
school bullying was (and still is) indeed a common phenomenon among children and youth in
Singapore and beyond. Hence they started conceptualizing ways to raise awareness about this
issue the idea of conducting the Bully-Free Campaign was born then.
It has been carried out in 2004 and is still being carried out today.
2. Was any research done by SCS to better understand the market needs, wants and beliefs prior
to the campaign? If there was, what are the needs, wants and beliefs?
Two research studies on school bullying were conducted to in 2006 and 2007 with secondary and
primary schools respectively to find out the prevalence rates of school bullying in Singapore.
Findings of the surveys revealed that one in four secondary school students and one in five
primary school students were victims of bullying.
You may learn more about the details of the studies from our research monograph titled
Bullying
in
Singapore
Schools,
which
is
downloadable
at http://www.childrensociety.org.sg/services/images/Bullying.pdf.
3. What are the primary and secondary target markets for the cyber bullying campaign?
Our bully-free campaign is focused on general bullying instead of cyber bullying though we do
cover a small aspect of cyber bullying as well. Our current target market is primary schools.
However, we do offer our services to secondary schools as well depending on their needs.
4. What are the objectives of this campaign? What did you wanted to achieve? (reduction of
cyber bullying, prevention of cyber bullying or awareness of cyber bullying?)
The objectives of the bully-free campaign are as follows:
1) To create greater awareness of the incidence of bullying in primary schools
2) To provide a platform for children/youth to discuss bullying and means/ways to deal with it.
5. Did SCS work with other stakeholders on this campaign?
We work with schools and parents on this campaign as we believe that bully-free living is a
collaborative effort between us, the school and families.
56
57
58
Changes made
I feel safe disclosing my
passwords to others.
(Others being anyone
other than yourself)
I do not mind revealing
my personal information
that can be viewed by
strangers online.
Discovered that you
were insulted on the
Internet?
Discovered that you had
been
deliberately
excluded from an online
group?
Seek help from relevant
authorities eg. school,
government
agencies
etc.)
59
cyberbullying incidents
will be addressed if there
are:
Other feedback
Grammatical, as well as vocabulary mistakes such as Question 30 where the word Catholic
should be Catholicism and siblings should be sibling(s).
60
61
SECTION I
Instruction: Choose the most appropriate answer for each of the following options where 1 =
Strongly disagree, 2 = Disagree, 3 = Neutral, 4 = Agree and 5 = Strongly agree.
Q1. I am competent in using
a. Cell phones applications (eg. SMS, Whatsapp, etc.)
(Strongly disagree) (Strongly agree)
1
2 3 4
5
b. Online forums (eg. hardwarezone forums, SGforums, cozycot etc)
(Strongly disagree) (Strongly agree)
1
2 3 4
5
c. Instant messaging (eg. MSN, Yahoo, etc.)
(Strongly disagree) (Strongly agree)
1
2 3 4
5
d. Social media (eg. Twitter, Facebook, etc.)
(Strongly disagree) (Strongly agree)
1
2 3 4
5
Q2. On the average, how many hours do you spend on the Internet daily (include time
spent on all communication devices (e.g. mobile phone, tablets) for leisure purposes?)
<2
2-4
5-7
>7
62
4-5
>5
e. Social media (eg. Twitter, Facebook, etc.)
0-1
2-3
4-5
>5
Q4. I feel safe chatting with strangers online.
(Strongly disagree)
1
(Strongly agree)
2 3 4
5
Q5. I feel safe disclosing my passwords to others (others being anyone other than
yourselves).
(Strongly disagree)
1
(Strongly agree)
2 3 4
5
Q6. I do not mind revealing my personal information that can be viewed by strangers
online.
(Strongly disagree)
1
(Strongly agree)
2 3 4
5
SECTION II
Instruction: Choose the most appropriate answer for each of the following options where 1 =
Never, 2 = Rarely, 3 = Sometimes, 4 = Very often, 5 = Always.
Q7. I disapprove of traditional bullying.
(Strongly disagree)
1
(Strongly agree)
2 3 4
5
63
d.
e.
f.
g.
h.
i.
j.
k.
l.
m.
n.
o.
p.
1
2 3 4
5
Discovered that you were insulted on the Internet?
(Never) (Always)
1
2 3 4
5
Sent obscene illustrations?
(Never) (Always)
1
2 3 4
5
Been sent obscene illustrations?
(Never) (Always)
1
2 3 4
5
Deliberately excluded someone from an online group?
(Never) (Always)
1
2 3 4
5
Discovered that you were deliberately excluded from an online group?
(Never) (Always)
1
2 3 4
5
Masqueraded/Pretended to be someone else online?
(Never) (Always)
1
2 3 4
5
Been deceived by someone masquerading/pretending to be someone else online?
(Never) (Always)
1
2 3 4
5
Spread gossip through the Internet?
(Never) (Always)
1
2 3 4
5
Discovered that you were the target of gossip through the Internet?
(Never) (Always)
1
2 3 4
5
Spread gossip through the mobile phone?
(Never) (Always)
1
2 3 4
5
Discovered that you were the target of gossip through the mobile phone?
(Never) (Always)
1
2 3 4
5
Taken part in voting in a defamatory poll online?
(Never) (Always)
1
2 3 4
5
Been the target of a defamatory poll online?
(Never) (Always)
1
2 3 4
5
64
(Strongly agree)
2 3 4
5
66
(Strongly agree)
2 3 4
5
Q13. The ease of being able to express anger through the Internet or mobile phone will lead
to cyberbullying.
(Strongly disagree)
1
(Strongly agree)
2 3 4
5
(Strongly agree)
2 3 4
5
(Strongly agree)
2 3 4
5
(Strongly agree)
2 3 4
5
Q17. Knowing the harm cyberbullying brings to the victim will motivate an individual to
stop cyberbullying.
(Strongly disagree)
1
(Strongly agree)
2 3 4
5
Q18. New technology that allows the ability to track users will motivate an individual to
stop cyberbullying.
(Strongly disagree)
1
(Strongly agree)
2
Q19. Performing ones duty as a member of society to help others will motivate an
individual to stop cyberbullying.
(Strongly disagree)
1
(Strongly agree)
2
Q20. Punishment (e.g. fines or ostracism) will deter an individual from cyberbullying.
67
(Strongly agree)
2 3 4
5
SECTION V
For this section, answer based on your personal opinions as to how much you agree with the
following statements where 1 = Strongly disagree, 2 = Disagree, 3 = Neutral, 4 = Agree and 5=
Strongly agree.
Q22. I believe that more cyberbullying incidents will be addressed if there are:
a. Helplines
(Strongly disagree) (Strongly agree)
1
2 3 4
5
b. Dedicated websites showing how to deal with/prevent cyberbullying.
(Strongly disagree) (Strongly agree)
1
2 3 4
5
c. Counsellors trained in dealing with cyberbullying
(Strongly disagree) (Strongly agree)
1
2 3 4
5
Q23. I believe the following will deter an individual from cyberbullying:
a. Fines for cyber bullies
(Strongly disagree) (Strongly agree)
1
2 3 4
5
b. Shame from publishing of the incident online or on the newspapers
(Strongly disagree) (Strongly agree)
1
2 3 4
5
c. Compulsory rehabilitation classes
(Strongly disagree) (Strongly agree)
1
2 3 4
5
Q24. If I am cyberbullied, I will most likely seek help in/through the following:
a. Schools
(Strongly disagree)
1
b. Community centres
(Strongly agree)
2 3 4
5
68
(Strongly agree)
2 3 4
5
(Strongly agree)
2 3 4
5
SECTION VI
Q27. What is your institution of study/work? (please indicate your full time occupation
only)
Junior College
Polytechnic
ITE
University (NUS/NTU/SIM/SIT/SMU/SUTD)
Other private educational institutions
Working
None of the above
<17
17-25
26-34
35-43
44-52
>52
Indian
Eurasian
Others (please state)
Q31. What is your religion?
Buddhism
Islam
Christianity
Catholicism
Taoism
Hinduism
Sikhism
Judaism
Others (please state)
<$1000
$1000 - $1999
$2000 - $2999
$3000 - $3999
$4000 - $4999
More than $5000
0
1
2
3
4
>4
71
72
73
Figure 24: Histogram for Dealing with Cyberbullying using Social Support
74
Factor Analysis
Table 2: KMO and Bartlett's Test for Methods of Dealing with Cyberbullying
Kaiser-Meyer-Olkin Measure of Sampling Adequacy.
Bartlett's Test of Sphericity
Approx. Chi-Square
df
.713
1111.746
78
Sig.
.000
Figure 28: Eigenvalue Screen Plot for Methods of Dealing with Cyberbullying
75
.090
.070
-.109
.822
.153
.141
.143
.788
.855
.059
-.102
.166
.873
-.063
-.094
.079
.914
.064
-.039
.063
-.062
-.312
.121
-.294
-.009
.034
.882
-.030
Seek help from relevant authorities (eg. school, government agency etc)
-.050
.123
.821
-.063
-.159
-.034
.759
.047
-.013
.694
.017
.270
.086
.773
-.086
.078
-.063
.668
.172
.025
.024
.703
.081
-.013
Reliability Testing
Table 4: Reliability Statistics for Internet and Mobile Phone Competency
Cronbach's Alpha
Based on
Cronbach's Alpha Standardized Items N of Items
.708
.741
76
Scale Variance if
Corrected Item-
Squared Multiple
Cronbach's Alpha if
Deleted
Item Deleted
Total Correlation
Correlation
Item Deleted
12.26
3.845
.560
.500
.621
13.30
3.271
.367
.169
.767
12.53
3.442
.563
.328
.603
12.40
3.692
.582
.537
.604
following:-Cell phones
applications (eg. SMS,
Whatsapp, etc.)
I am competent in using the
following:-Online forums (eg.
Hardwarezone, SgForums,
CozyCot, etc.)
I am competent in using the
following:-Instant messaging (eg.
MSN, Yahoo, etc.)
I am competent in using the
following:-Social media (eg.
Twitter, Facebook, etc.)
N of Items
.516
N of Items
.693
.780
77
N of Items
7
N of Items
.672
N of Items
.775
Table 11: Reliability Statistics for Dealing with Cyberbullying using Acceptance
Cronbach's Alpha
Based on
Cronbach's Alpha Standardized Items
.588
N of Items
.589
Table 12: Reliability Statistics for Dealing with Cyberbullying using Avoidance
Cronbach's Alpha
Based on
Cronbach's Alpha Standardized Items
.870
N of Items
.871
Table 13: Reliability Statistic for Dealing with Cyberbullying using Social Support
Cronbach's Alpha
Based on
Cronbach's Alpha Standardized Items
.776
.776
78
N of Items
3
Table 14: Reliability Statistics for Dealing with Cyberbullying using Prevention
Cronbach's Alpha
Based on
Cronbach's Alpha Standardized Items
.689
N of Items
.697
N of Items
.640
Scale Variance if
Corrected Item-
Squared Multiple
Cronbach's Alpha if
Deleted
Item Deleted
Total Correlation
Correlation
Item Deleted
11.75
2.777
.585
.493
.453
11.73
3.045
.508
.474
.520
11.20
3.937
.304
.170
.659
10.85
4.078
.338
.158
.637
.672
79
N of Items
5
Cronbachs
Alpha
0.708
N of
Items
3
0.513
0.674
0.516
0.693
3
3
0.771
0.780
0.667
0.672
0.762
0.775
0.588
0.589
0.870
0.871
0.776
0.776
0.689
0.697
0.648
0.672
0.659
0.672
3
6
ANOVA Testing
Table 19: ANOVA of Internet Competencies between Religion
Sum of Squares
Between Groups
df
Mean Square
5.427
.904
Within Groups
100.703
286
.352
Total
106.130
292
80
F
2.569
Sig.
.019
Mean
Std.
Std.
Deviation
Error
Lower Bound
Upper Bound
Minimum
Maximum
Buddhism
68 4.4608
.52160 .06325
4.3345
4.5870
2.67
5.00
Islam
11 4.6970
.31463 .09486
4.4856
4.9083
4.00
5.00
Christianity
114 4.4240
.63228 .05922
4.3067
4.5413
1.00
5.00
Catholicism
9 4.2593
.49379 .16460
3.8797
4.6388
3.67
5.00
21 4.7937
.32449 .07081
4.6459
4.9414
4.00
5.00
2 4.0000
.47140 .33333
-.2354
8.2354
3.67
4.33
68 4.2990
.69143 .08385
4.1317
4.4664
1.33
5.00
293 4.4323
.60287 .03522
4.3630
4.5016
1.00
5.00
Taoism
Hinduism
Others
Total
Table 21: ANOVA of Indirect Cyberbullying Behaviours Encountered between No. of Siblings
Sum of Squares
Between Groups
df
Mean Square
2.285
.457
Within Groups
56.030
287
.195
Total
58.314
292
Sig.
2.341
.042
Std.
N
Mean
Lower Bound
Upper Bound
Minimum
Maximum
19
1.3759
.40184
.09219
1.1823
1.5696
1.00
2.29
128
1.4364
.47880
.04232
1.3526
1.5201
1.00
3.86
97
1.3623
.39181
.03978
1.2833
1.4413
1.00
3.14
38
1.3496
.37825
.06136
1.2253
1.4740
1.00
2.29
1.5873
.67175
.22392
1.0709
2.1037
1.00
2.43
>4
2.2857
.60609
.42857
-3.1598
7.7312
1.86
2.71
293
1.4071
.44688
.02611
1.3557
1.4585
1.00
3.86
Total
81
Table 23: ANOVA of Direct Cyberbullying Behaviours Encountered between Type of Housing
Sum of Squares
Between Groups
df
Mean Square
2.924
.731
Within Groups
78.373
288
.272
Total
81.297
292
F
2.686
Sig.
.032
N
Public housing (HDB flats)
Condominium
Townhouses (blend of terrace
Mean
Std.
Std.
Deviation
Error
Upper Bound
Minimum
Maximum
221
1.2964
.52152
.03508
1.2272
1.3655
1.00
4.00
39
1.2308
.39480
.06322
1.1028
1.3587
1.00
3.00
1.6250
.47871
.23936
.8633
2.3867
1.00
2.00
23
1.3478
.55257
.11522
1.1089
1.5868
1.00
3.00
1.9167
1.02062
.41667
.8456
2.9877
1.00
3.00
293
1.3089
.52765
.03083
1.2482
1.3695
1.00
4.00
82
Percent
Valid Percent
Cumulative Percent
1.00
.3
.3
.3
1.33
.3
.3
.7
2.67
1.0
1.0
1.7
3.00
1.4
1.4
3.1
3.33
2.0
2.0
5.1
3.67
15
5.1
5.1
10.2
4.00
75
25.6
25.6
35.8
4.33
34
11.6
11.6
47.4
4.67
48
16.4
16.4
63.8
5.00
106
36.2
36.2
100.0
Total
293
100.0
100.0
Percent
Valid Percent
Cumulative Percent
23
7.8
7.8
7.8
2-4
116
39.6
39.6
47.4
5-7
83
28.3
28.3
75.8
>7
71
24.2
24.2
100.0
293
100.0
100.0
Total
83
Percent
Valid Percent
Cumulative Percent
1.00
33
11.3
11.3
11.3
1.33
39
13.3
13.3
24.6
1.67
51
17.4
17.4
42.0
2.00
57
19.5
19.5
61.4
2.33
44
15.0
15.0
76.5
2.67
33
11.3
11.3
87.7
3.00
22
7.5
7.5
95.2
3.33
10
3.4
3.4
98.6
3.67
.7
.7
99.3
4.00
.7
.7
100.0
Total
293
100.0
100.0
84
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
2.4
2.4
2.4
Disagree
.7
.7
3.1
12
4.1
4.1
7.2
Agree
99
33.8
33.8
41.0
Strongly Agree
173
59.0
59.0
100.0
Total
293
100.0
100.0
Table 29: Chi-Square Test for Correlation between Disapproving Traditional Bullying and
Cyberbullying and Cyberbullying Behaviours Exhibited
Asymp. Sig. (2Value
Pearson Chi-Square
Likelihood Ratio
Linear-by-Linear Association
df
sided)
93.853a
84
.217
64.065
84
.948
1.097
.295
N of Valid Cases
293
Table 30: Chi-Square Test for Correlation between Internet Competency and Cyberbullying
Behaviours Exhibited
Asymp. Sig. (2Value
df
sided)
258.071a
189
.001
125.359
189
1.000
Linear-by-Linear Association
.014
.905
N of Valid Cases
293
Pearson Chi-Square
Likelihood Ratio
a. 202 cells (91.8%) have expected count less than 5. The minimum
expected count is .00.
85
Table 31: Paired Samples Test for Direct and Indirect Cyberbullying Behaviours Exhibited
Paired Differences
95% Confidence Interval of
Mean
Pair 1
Direct cyberbullying
-.22217
Std.
Std. Error
Deviation
Mean
.48979
.02861
Sig.
the Difference
Lower
(2-
Upper
-.27848
-.16585
-7.764
df
292
tailed)
.000
Table 32: Chi-square Test for Correlation between Risky Internet Behaviours and Cyberbullying
Behaviours Encountered
Asymp. Sig. (2Value
Pearson Chi-Square
Likelihood Ratio
Linear-by-Linear Association
df
sided)
191.086a
171
.140
134.608
171
.982
9.341
.002
N of Valid Cases
293
a. 187 cells (93.5%) have expected count less than 5. The minimum
expected count is .01.
86
Table 33: Independent Samples Test for Cyberbullying Behaviours Exhibited and Encountered
by Males and Females
Levene's Test
for Equality of
Variances
F
Cyberbullying
Equal variances
behaviours
assumed
exhibited
12.876
Sig.
.000
Equal variances
df
2.139
Sig. (2-
Mean
Std. Error
tailed)
Difference
Difference
Difference
Lower
Upper
291
.033
.11267
.05268
.00899
.21634
2.117 251.623
.035
.11267
.05323
.00784
.21749
2.311
291
.022
.11318
.04897
.01679
.20956
2.286 249.873
.023
.11318
.04950
.01568
.21067
not assumed
Cyberbullying
Equal variances
behaviours
assumed
encountered
17.092
.000
Equal variances
not assumed
Table 34: Chi-Square Test for Correlation between Number of Hours Spent on Internet and
Cyberbullying Behaviours exhibited
Asymp. Sig. (2Value
Pearson Chi-Square
Likelihood Ratio
Linear-by-Linear Association
N of Valid Cases
df
sided)
53.707a
63
.792
59.267
63
.610
5.375
.020
293
a. 68 cells (77.3%) have expected count less than 5. The minimum expected
count is .08.
87
Table 35: Chi-Square Test for Correlation between Number of Hours Spent on Internet and
Cyberbullying Behaviours encountered
Asymp. Sig. (2Value
Pearson Chi-Square
Likelihood Ratio
Linear-by-Linear Association
N of Valid Cases
df
sided)
65.665a
57
.202
68.460
57
.142
4.807
.028
293
a. 59 cells (73.8%) have expected count less than 5. The minimum expected
count is .08.
88
Mean
Pair 1
Std.
Std. Error
Deviation
Mean
.23720
.96517
.05639
of the Difference
Lower
Sig. (2-
Upper
.12623
.34818
df
4.207
tailed)
292
.000
Table 37: Independent Samples Test for Differences in Methods to Dealing with Cyberbullying
between the Age Groups 17-25 and 26-34
Levene's Test
for Equality of
Variances
F
Dealing with cyberbullying Equal variances assumed
using avoidance
.261
Sig.
.610
t
-.582
df
tailed)
Mean
Std. Error
Difference Difference
of the Difference
Lower
Upper
291
.561
-.09755
.16764
-.42750
.23240
-.586 42.334
.561
-.09755
.16635
-.43318
.23809
291
.155
-.24120
.16930
-.57441
.09201
-1.504 43.592
.140
-.24120
.16042
-.56458
.08219
291
.930
.01522
.17407
-.32739
.35782
.089 42.706
.929
.01522
.17028
-.32825
.35869
.407
291
.684
.04602
.11314
-.17665
.26869
.292 36.661
.772
.04602
.15771
-.27364
.36567
assumed
Dealing with cyberbullying Equal variances assumed
using acceptance
.671
.414 -1.425
.520
.471
.087
assumed
Dealing with cyberbullying Equal variances assumed
using prevention
5.423
.021
assumed
89
Mean
Pair 1
Std.
Std. Error
Deviation
Mean
.881
1.025
of the Difference
Lower
.060
Sig. (2-
Upper
.763
.998
df
14.704
tailed)
292
.000
Table 39: Paired Samples Test for Competitive Behaviours to Adoption of Non-cyberbullying
Behaviours
Paired Differences
95% Confidence Interval
Mean
Pair 1
.256
Std.
Std. Error
Deviation
Mean
.982
90
.057
of the Difference
Lower
.143
Upper
.369
Sig. (2t
4.460
df
292
tailed)
.000
Table 40: Paired Samples Test for Top Two Benefits that will Motivate Individuals not to
Cyberbully
Paired Differences
95% Confidence Interval
Mean
Pair 1
.058
Std.
Std. Error
Deviation
Mean
.910
91
.053
of the Difference
Lower
-.047
Upper
.163
Sig. (2t
1.091
df
292
tailed)
.276
3.7577
3.7
3.6246
Helplines
3.6
Dedicated
Websites
3.5
3.4
3.3823
Counsellors
3.3
3.2
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
2.7
2.7
2.7
Disagree
41
14.0
14.0
16.7
91
31.1
31.1
47.8
137
46.8
46.8
94.5
16
5.5
5.5
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
2.0
2.0
2.0
Disagree
26
8.9
8.9
10.9
68
23.2
23.2
34.1
165
56.3
56.3
90.4
28
9.6
9.6
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
92
Percent
Strongly Disagree
Valid Percent
Cumulative Percent
2.0
2.0
2.0
Disagree
16
5.5
5.5
7.5
55
18.8
18.8
26.3
182
62.1
62.1
88.4
34
11.6
11.6
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Table 44: Paired Samples Test for Top Two Social Marketing Products
Paired Differences
95% Confidence Interval
Mean
Pair 1 I believe cyberbullying incidents will
Std.
Std. Error
Deviation
Mean
.133
.740
of the Difference
Lower
.043
Upper
.048
4.0137
4
3.95
Fines
Punishment
3.9147
3.9
3.85
3.8430
3.8
93
Rehabilitation
classes
.218
Sig. (2t
3.080
df
292
tailed)
.002
Percent
Strongly Disagree
Valid Percent
Cumulative Percent
1.0
1.0
1.0
Disagree
28
9.6
9.6
10.6
36
12.3
12.3
22.9
150
51.2
51.2
74.1
76
25.9
25.9
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Percent
Strongly Disagree
Valid Percent
Cumulative Percent
.7
.7
.7
Disagree
24
8.2
8.2
8.9
35
11.9
11.9
20.8
139
47.4
47.4
68.3
93
31.7
31.7
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
.7
.7
.7
Disagree
21
7.2
7.2
7.8
59
20.1
20.1
28.0
150
51.2
51.2
79.2
61
20.8
20.8
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
94
Table 48: Paired Samples Test for Top Two Social Marketing Prices
Paired Differences
95% Confidence Interval
Mean
Pair 1
Std.
Std. Error
Deviation
Mean
.099
.937
.055
of the Difference
Lower
Sig. (2-
Upper
-.009
.207
df
1.809
3.6
Schools
3.4130
3.4
3.2
Community
centres
3.0887
Online
2.8
2.5768
2.6
Home
2.4
2.2
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
33
11.3
11.3
11.3
Disagree
61
20.8
20.8
32.1
88
30.0
30.0
62.1
Agree
69
23.5
23.5
85.7
Strongly Agree
42
14.3
14.3
100.0
293
100.0
100.0
Total
95
292
tailed)
.071
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
52
17.7
17.7
17.7
Disagree
97
33.1
33.1
50.9
89
30.4
30.4
81.2
Agree
33
11.3
11.3
92.5
Strongly Agree
22
7.5
7.5
100.0
293
100.0
100.0
Total
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
17
5.8
5.8
5.8
Disagree
36
12.3
12.3
18.1
70
23.9
23.9
42.0
113
38.6
38.6
80.5
57
19.5
19.5
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
28
9.6
9.6
9.6
Disagree
40
13.7
13.7
23.2
71
24.2
24.2
47.4
Agree
91
31.1
31.1
78.5
Strongly Agree
63
21.5
21.5
100.0
293
100.0
100.0
Total
96
Table 53: Paired Samples Test for Top Two Social Marketing Places
Paired Differences
95% Confidence Interval
Std.
Mean
Pair 1 If I am cyberbullied, I will most likely
.123
Deviatio
Std. Error
Mean
1.392
of the Difference
Lower
.081
Sig. (2-
Upper
-.037
.283
t
1.511
df
292
3.9181
3.9
3.8
Personal
recount
3.6860
3.7
Celebrity
endorsement
3.6
3.5
3.4061
Psychologist
opinion
3.4
3.3
3.2
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
1.7
1.7
1.7
Disagree
11
3.8
3.8
5.5
38
13.0
13.0
18.4
188
64.2
64.2
82.6
51
17.4
17.4
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
97
tailed)
.132
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
12
4.1
4.1
4.1
Disagree
43
14.7
14.7
18.8
79
27.0
27.0
45.7
132
45.1
45.1
90.8
27
9.2
9.2
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
1.4
1.4
1.4
Disagree
24
8.2
8.2
9.6
68
23.2
23.2
32.8
161
54.9
54.9
87.7
36
12.3
12.3
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
98
Table 57: Paired Samples Test for Top Two Social Marketing Promotional Tools
Paired Differences
95% Confidence Interval
Mean
Pair 1 Anti-cyberbullying campaigns will be most
Std.
Std. Error
Deviation
Mean
.232
.929
.054
of the Difference
Lower
Sig. (2-
Upper
.125
.339
t
4.274
df
292
4.2
Printed materials
3.9283
3.8055
3.7
3.7884
3.5119
3.3652
Adevertising
3.2969
Entertainment media
3.2
2.9010
Social media
2.7
Websites
2.2
99
tailed)
.000
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
2.0
2.0
2.0
Disagree
16
5.5
5.5
7.5
49
16.7
16.7
24.2
180
61.4
61.4
85.7
42
14.3
14.3
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
13
4.4
4.4
4.4
Disagree
43
14.7
14.7
19.1
81
27.6
27.6
46.8
136
46.4
46.4
93.2
20
6.8
6.8
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
23
7.8
7.8
7.8
Disagree
83
28.3
28.3
36.2
99
33.8
33.8
70.0
Agree
76
25.9
25.9
95.9
Strongly Agree
12
4.1
4.1
100.0
293
100.0
100.0
Total
100
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
17
5.8
5.8
5.8
Disagree
43
14.7
14.7
20.5
86
29.4
29.4
49.8
130
44.4
44.4
94.2
17
5.8
5.8
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
1.7
1.7
1.7
Disagree
13
4.4
4.4
6.1
46
15.7
15.7
21.8
163
55.6
55.6
77.5
66
22.5
22.5
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
3.1
3.1
3.1
Disagree
33
11.3
11.3
14.3
81
27.6
27.6
42.0
139
47.4
47.4
89.4
31
10.6
10.6
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
101
Percent
Valid Percent
Cumulative Percent
Strongly Disagree
1.0
1.0
1.0
Disagree
2.7
2.7
3.8
28
9.6
9.6
13.3
160
54.6
54.6
67.9
94
32.1
32.1
100.0
293
100.0
100.0
Strongly Disagree
Percent
Valid Percent
Cumulative Percent
1.4
1.4
1.4
Disagree
11
3.8
3.8
5.1
72
24.6
24.6
29.7
162
55.3
55.3
85.0
44
15.0
15.0
100.0
293
100.0
100.0
Agree
Strongly Agree
Total
102
Table 66: Paired Samples Test for Top Two Social Marketing Promotion Channels
Paired Differences
95% Confidence Interval
Mean
Pair 1
.212
Std.
Std. Error
Deviation
Mean
.765
103
.045
of the Difference
Lower
.124
Sig. (2-
Upper
.300
t
4.735
df
292
tailed)
.000