{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T15:45:56Z","timestamp":1777563956219,"version":"3.51.4"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education, Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2019\/SS05\/UTAR\/02\/2"],"award-info":[{"award-number":["FRGS\/1\/2019\/SS05\/UTAR\/02\/2"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002671","name":"Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002671","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3015669","type":"journal-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T21:30:18Z","timestamp":1597095018000},"page":"148031-148051","source":"Crossref","is-referenced-by-count":60,"title":["Cyberbullying: A Systematic Literature Review to Identify the Factors Impelling University Students Towards Cyberbullying"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1221-1791","authenticated-orcid":false,"given":"Farhan","family":"Bashir Shaikh","sequence":"first","affiliation":[{"name":"Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1182-2504","authenticated-orcid":false,"given":"Mobashar","family":"Rehman","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"given":"Aamir","family":"Amin","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2004.t01-1-00293.x"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1037\/a0034335"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.037"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2005.07.006"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.09.004"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2009.03.021"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1001\/archgenpsychiatry.2010.79"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2372233.2372235"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1348\/026151003322277757"},{"key":"ref38","year":"2007","journal-title":"Centre for Reviews and Dissemination what are the Criteria for the Inclusion of Reviews on DARE?"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.044"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.jad.2019.05.061"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.pse.2016.03.002"},{"key":"ref32","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"kitchenham","year":"2004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.npbr.2011.02.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.12.436"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.5817\/CP2018-4-1","article-title":"A systematic literature review of factors that moderate bystanders&#x2019; actions in cyberbullying","volume":"12","author":"dom\u00ednguez-hern\u00e1ndez","year":"2018","journal-title":"Cyberpsychology Journal of Psychosocial Research on Cyberspace"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2018.06.008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2017.12.003"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2019.03074"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph14080888"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-018-9941-5"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.036"},{"key":"ref28","year":"2017","journal-title":"Cyberstalking a Serious Threat"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.21913\/JSW.v1i2.172"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1086\/349641"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.09.013"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2009.07.009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/0886260503262083"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.038"},{"key":"ref68","first-page":"1","article-title":"Childhood emotional abuse and cyberbullying perpetration among adolescents: The mediating role of trait mindfulness","volume":"17","author":"emirtekin","year":"2020","journal-title":"International Journal of Mental Health & Addiction"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00505-6"},{"key":"ref2","first-page":"157","article-title":"Cyberbullying in schools: A research of gender differences","volume":"27","author":"li","year":"2006","journal-title":"Psychology in the Schools"},{"key":"ref1","year":"2020","journal-title":"Internet Top 20 Countries-Internet Users 2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/698545"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2011.630310"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/13607863.2016.1262818"},{"key":"ref24","first-page":"562","article-title":"Evidence for the need to support adolescents dealing with harassment and cyber-harassment: Prevalence, progression, and impact","volume":"33","author":"beran","year":"2012","journal-title":"Psychology in the Schools"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2020.112856"},{"key":"ref26","first-page":"1307","article-title":"Psychological needs as a predictor of cyber bullying: A preliminary report on college students","volume":"9","author":"dilma\u00e7","year":"2009","journal-title":"Educ Sci Theory Pract"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.10.002"},{"key":"ref50","first-page":"257","article-title":"Predicting the intention to cyberbully and cyberbullying behaviour among the undergraduate students at the International Islamic University Malaysia","volume":"2","author":"rashid","year":"2017","journal-title":"J Educ Psychol Couns"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2020.109829"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.6007\/IJARBSS\/v6-i12\/2532"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.643168"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.03.015"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.018"},{"key":"ref55","first-page":"6472","article-title":"Determinant factors of cyberbullying: An application of theory of planned behavior","volume":"95","author":"jafarkarimi","year":"2017","journal-title":"J Theor Appl Inf Technol"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.07.006"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.062"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.00486"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0265407518822774"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1027\/0044-3409.217.4.197"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-018-9894-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/su8101077"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTM.2016.7890808"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/1534484305278283"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1080\/02673843.2019.1669059"},{"key":"ref16","year":"2020","journal-title":"Cyberbullying |Definition of Cyberbullying by Merriam-Webster"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.soscij.2018.06.002","article-title":"Reactions to cyberbullying among high school and university students","volume":"56","author":"eri?ti","year":"2019","journal-title":"The Social Science Journal"},{"key":"ref17","author":"willard","year":"2007","journal-title":"Cyberbullying and Cyberthreats Responding to the Challenge of Online Social Aggression Threats and Distress"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3389\/fpsyg.2019.01620","article-title":"Differential analysis of psychopathological impact of cyberbullying in university students","volume":"10","author":"felipe-casta\u00f1o","year":"2019","journal-title":"Front Psychol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/pits.20301"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-019-00151-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e01393"},{"key":"ref4","author":"zickuhr","year":"2020","journal-title":"Generations 2010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijics.20170205.11"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"ref5","year":"2020","journal-title":"5 Differences Between Cyber Bullying and Traditional Bullying"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0227051"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/00131720508984869"},{"key":"ref7","author":"robinson","year":"2020","journal-title":"Bullying and Cyberbullying&#x2014;Helpguide Org"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601278"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.33824\/PJPR.2019.34.4.43"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1177\/0022022116684208"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.02.002"},{"key":"ref47","first-page":"107","article-title":"Pattern and correlates of cyberbullying victimization among Egyptian University students in Beni-Suef, Egypt","volume":"92","author":"arafa","year":"2017","journal-title":"The Journal of the Egyptian Public Health Association"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2019.01098"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph16071217"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.045"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5817\/CP2018-4-2"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09163353.pdf?arnumber=9163353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:06:44Z","timestamp":1662667604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9163353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3015669","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}