{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:25:28Z","timestamp":1772810728321,"version":"3.50.1"},"reference-count":146,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Education, Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2019\/SS05\/UTAR\/02\/2"],"award-info":[{"award-number":["FRGS\/1\/2019\/SS05\/UTAR\/02\/2"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002671","name":"Universiti Tunku Abdul Rahman, Kampar, Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002671","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3086679","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T19:59:29Z","timestamp":1622836769000},"page":"92715-92734","source":"Crossref","is-referenced-by-count":22,"title":["Cyberbullying Behaviour: A Study of Undergraduate University Students"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1221-1791","authenticated-orcid":false,"given":"Farhan Bashir","family":"Shaikh","sequence":"first","affiliation":[{"name":"Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1182-2504","authenticated-orcid":false,"given":"Mobashar","family":"Rehman","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"given":"Aamir","family":"Amin","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2588-6464","authenticated-orcid":false,"given":"Amjad","family":"Shamim","sequence":"additional","affiliation":[{"name":"Department of Management and Humanities, Center of Social Innovation, Institute of Self-Sustainable Building, Universiti Teknologi PETRONAS, Seri Iskandar, Perak Darul Ridzuan, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6617-8149","authenticated-orcid":false,"given":"Manzoor Ahmed","family":"Hashmani","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia"}]}],"member":"263","reference":[{"key":"ref39","first-page":"5513","article-title":"Social cognitive theory of human development","author":"bandura","year":"1996","journal-title":"International Encyclopedia of Education"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.09.013"},{"key":"ref33","article-title":"Our teens are bullies","author":"meikeng","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2017.7492"},{"key":"ref31","article-title":"Investigating the prevalence and impact of peer abuse (bullying) on the development of Jamaica&#x2019;s children study commissioned by child development agency","author":"eek","year":"2015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2020.112856"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21913\/JSW.v1i2.172"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2005.07.006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00505-6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTM.2016.7890808"},{"key":"ref28","article-title":"Link made between cyberbullying and teen suicides often overshadows mental health issues: Experts | CTV News","author":"auld","year":"2013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2011.630310"},{"key":"ref29","article-title":"Student in penang left a suicide note on facebook before jumping to his death","author":"ruxyn","year":"2017"},{"key":"ref20","first-page":"1","article-title":"Internet users survey 2018: Statistical brief number twenty-three","volume":"2018","year":"2018","journal-title":"Survey on Internet Use"},{"key":"ref22","first-page":"257","article-title":"Predicting the intention to cyberbully and cyberbullying behaviour among the undergraduate students at the International Islamic University Malaysia","volume":"2","author":"rashid","year":"2017","journal-title":"J Educ Psychol Couns"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/2158244014526721"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.10.260"},{"key":"ref23","first-page":"2014","article-title":"Najib: Cyber bullying a serious threat to kids","volume":"28","author":"razak","year":"2012","journal-title":"Star"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/13607863.2016.1262818"},{"key":"ref100","first-page":"6472","article-title":"Determinant factors of cyberbullying: An application of theory of planned behavior","volume":"95","author":"jafarkarimi","year":"2017","journal-title":"J Theor Appl Inf Technol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/698545"},{"key":"ref50","article-title":"Cyberbullying: A literature review","author":"fegenbush","year":"2009","journal-title":"Proc Annu Meeting Louisiana Educ Res Assoc"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.2196\/16210"},{"key":"ref59","article-title":"Managing risk and uncertainty on projects: A cognitive approach","author":"winch","year":"2011","journal-title":"The Oxford Handbook of Project Management"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1177\/2055207618811555"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/ijop.12034"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref55","first-page":"83","author":"schunk","year":"1989","journal-title":"Social Cognitive Theory and Self-Regulated Learning"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1080\/01443410.2017.1387644","volume":"38","author":"weissgerber","year":"2018","journal-title":"Educ Psychol"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2016.07.018"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/su11113164"},{"key":"ref40","volume":"1","author":"bandura","year":"1977","journal-title":"Social Learning Theory"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2013.844072"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1136\/archdischild-2014-306667"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.02.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/chso.12103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015669"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601278"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.techfore.2019.119734","article-title":"Improving quality of life perception with ICT use and technological capacity in europe","volume":"148","author":"nevado-pe\u00f1a","year":"2019","journal-title":"Technol Forecasting Social Change"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9867-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"ref48","author":"nancy","year":"2008","journal-title":"An Educator&#x2019;s Guide to Cyberbullying and Cyberthreats Center for Safe and Responsible Internet Use&#x2014;Google Search"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.5817\/CP2018-4-2"},{"key":"ref42","first-page":"52","article-title":"Cyberbullying presence, extent, & forms in a midwestern post-secondary institution","volume":"29","author":"smith","year":"2012","journal-title":"Proc Inf Syst Educ Conf (ISECON)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/00405841.2014.947221"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.11648\/j.ijics.20170205.11"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.02.016"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2017.1416655"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr2501_3"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1002\/9781118895238.ch8"},{"key":"ref124","first-page":"1","year":"2018","journal-title":"Quick Facts 2018"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.18844\/wjet.v10i4.3793"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.6007\/IJARBSS\/v6-i12\/2532"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"ref71","first-page":"129","article-title":"The effect of personality on cyberbullying among university students in Turkey","author":"atak","year":"2012","journal-title":"European Journal of Research on Education"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-10-2013-0128"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2020.109829"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2009.07.009"},{"key":"ref130","first-page":"1","article-title":"Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS","volume":"24","author":"wong","year":"2013","journal-title":"Mark Bull"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341263"},{"key":"ref74","first-page":"269","article-title":"High school students&#x2019; perceptions of motivations for cyberbullying: An exploratory study","volume":"11","author":"varjas","year":"2010","journal-title":"West J Emerg Med"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/0886260513505149"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.44.4.723"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.06.020"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.049"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2004.00330.x"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1521\/soco.2007.25.5.603"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01821.x"},{"key":"ref136","author":"atherton","year":"2013","journal-title":"The relationship between the school environment and antisocial behaviour"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1177\/0963721417700457"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-019-00407-6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.03.001"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2013.858626"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2014.03.003"},{"key":"ref63","first-page":"614","article-title":"Predicting adolescent perpetration in cyberbullying: An application of the theory of planned behavior","volume":"24","author":"heirman","year":"2012","journal-title":"Psicothema"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/109467002237494"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.15.1.68"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2014.949377"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.047"},{"key":"ref142","first-page":"45","article-title":"Cyber bullying: Recognizing and treating victim and aggressor","volume":"25","author":"kowalski","year":"2008","journal-title":"Psychiatric Times"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2016.10.063"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1080\/23311886.2015.1132985"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.020"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1080\/02673843.2019.1669059"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.08.010"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2017.09.013"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.10.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.psychres.2021.113730"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1080\/17518420902971356"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.10.036"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.jad.2014.07.019"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2016.08.022"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1177\/1368430206071661"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101331"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.encep.2012.01.008"},{"key":"ref105","first-page":"15","article-title":"Applying the theory of planned behavior in predicting proenvironmental behaviour: The case of energy conservation","volume":"11","author":"macovei","year":"2015","journal-title":"Acta Univ Danubius &#x0152;conomica"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.048"},{"key":"ref104","author":"kowalski","year":"2012","journal-title":"Cyberbullying bullying in the digital age"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s12310-013-9104-6"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1002\/jtr.2042"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1080\/02796015.2003.12086206"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2002040102"},{"key":"ref110","year":"2012","journal-title":"Cyberbullying Increases in Line With Mobile Phone Uusage? (Infographic) |ZDNet"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1108\/10662240410542634"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.3390\/su8101077"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1002\/jocc.12055"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101223"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.05.013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.08.036"},{"key":"ref13","first-page":"1","article-title":"Cyber-dilemmas: Gendered hierarchies, free expression and cyber-safety in schools","author":"shariff","year":"2005","journal-title":"Safety and Security in a Networked World Balancing Cyber-Rights and Responsibilities"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.038"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.43.3.564"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.2307\/2096350"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.1245"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1177\/0306624X03256131"},{"key":"ref117","author":"anderson-butcher","year":"2013","journal-title":"Community and youth collaborative institute school experience surveys Peer relationship scale in middle & high school"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2010.00548.x"},{"key":"ref81","first-page":"1","article-title":"Benchmarking aggression identification in social media","author":"kumar","year":"2018","journal-title":"Proc Workshop Trolling Aggression Cyberbullying"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.021"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-815310-9.00001-0"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1037\/a0028113"},{"key":"ref19","year":"2020","journal-title":"MyCERT? Incident Statistics&#x2014;Reported Incidents based on General Incident Classification Statistics 2020"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1017\/S095457940999006X"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1037\/a0019265"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1177\/0886260516646095","article-title":"Cyberbullying awareness for mitigating consequences in higher education","volume":"34","author":"el\u00e7i","year":"2019","journal-title":"J Interpersonal Violence"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1994.tb01146.x"},{"key":"ref80","first-page":"120","article-title":"Multilingual joint fine-tuning of transformer models for identifying trolling, aggression and cyberbullying at TRAC 2020","author":"mishra","year":"2020","journal-title":"Proc Workshop Trolling Aggression Cyberbullying"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1177\/0272431601021001003"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2017.02.004"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1108\/17504971111142637"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.017"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.003"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.2307\/41410412"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azm076"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1100\/2011\/308631"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.10.002"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-018-9894-8"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09446860.pdf?arnumber=9446860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:48:34Z","timestamp":1662670114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9446860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":146,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3086679","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}