{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:21:51Z","timestamp":1762014111516,"version":"build-2065373602"},"reference-count":76,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>This study analyses the post content and the emotions reflected in 10 open Facebook groups associated with cyberbullying, with the highest number of group members. Automated extraction via Facebook API was used to gather the data. Altogether, 313 Facebook posts were extracted and coded for content analysis. Sentiment analysis and parts of speech (POS) tagging was used to explore the emotions reflected in the content. The study findings revealed that (1) the content of the posts was mainly opinion-based in comparison to expressing personal experiences of cyberbullying. This indicated Facebook groups require stronger moderation due to digression of topics discussed. (2) Only 3% of posts in this study contained advice about cyberbullying. (3) Sentiment analysis of the posts showed that the Facebook groups focused on cyberbullying, reflected more positive sentiments in their posts. This is encouraging to cyberbullying victims to share information on cyberbullying. The findings in this study lay the foundations for more research into support for cyberbullying victims.<\/jats:p>","DOI":"10.4018\/ijt.2019070103","type":"journal-article","created":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T10:58:30Z","timestamp":1559041110000},"page":"35-56","source":"Crossref","is-referenced-by-count":7,"title":["Support for Cyberbullying Victims and Actors"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0413-3893","authenticated-orcid":true,"given":"Sophia","family":"Alim","sequence":"first","affiliation":[{"name":"Independent Researcher, Bradford, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shehla","family":"Khalid","sequence":"additional","affiliation":[{"name":"Independent Researcher, Bradford, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"IJT.2019070103-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcjd.2016.08.217"},{"key":"IJT.2019070103-1","unstructured":"Alakrot, A., & Nikolov, N. S. (2015). A survey of text mining approaches to cyberbullying detection in online communication flows. In NUI Galway-UL Alliance 5th Postgraduate Research Day. Retrieved from: https:\/\/www.researchgate.net\/publication\/279173950_A_Survey_of_Text_Mining_Approaches_to_Cyberbullying_Detection_in_Online_Communication_Flows"},{"key":"IJT.2019070103-2","doi-asserted-by":"publisher","DOI":"10.4018\/IJCBPL.2015100103"},{"key":"IJT.2019070103-3","first-page":"356","article-title":"How noisy social media text, how diffrnt social media sources?","author":"T.Baldwin","year":"2013","journal-title":"Proceedings of the Sixth International Joint Conference on Natural Language Processing"},{"year":"2017","author":"P.Barbera","key":"IJT.2019070103-4"},{"key":"IJT.2019070103-5","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1560"},{"issue":"1","key":"IJT.2019070103-6","first-page":"27","article-title":"Flooding Facebook-the use of social media during the Queensland and Victorian floods.","volume":"27","author":"D.Bird","year":"2012","journal-title":"Australian Journal of Emergency Management"},{"key":"IJT.2019070103-7","unstructured":"Blundy, R., Ng, Y., & Zheng, S. (2017). Hong Kong kids suffer cyberbullying in silence amid suicide spike. South China Morning Post. Retrieved from http:\/\/www.scmp.com\/news\/hong-kong\/article\/2075891\/cyberbullying-contributing-youth-suicides-hong-kong"},{"key":"IJT.2019070103-8","unstructured":"Boyer, M. B. (2015). An Examination of Catholic School Teachers' Perceptions and Legal Understanding of Cyberbullying [Doctoral dissertation]. Loyola Marymount University."},{"key":"IJT.2019070103-9","unstructured":"Campbell, M. A. (2007). Cyber bullying and young people: Treatment principles not simplistic advice. Retrieved from http:\/\/eprints.qut.edu.au\/14903\/1\/14903.pdf"},{"key":"IJT.2019070103-10","doi-asserted-by":"publisher","DOI":"10.1111\/chso.12136"},{"key":"IJT.2019070103-11","unstructured":"Connolly, J. P. (2017). \u2018The silence phenomenon\u2019 an exploration of the factors influencing Irish gifted adolescents\u2019 resistance to report their experiences of cyberbullying behaviour [Doctoral dissertation]. Dublin City University."},{"key":"IJT.2019070103-12","unstructured":"Cross, D., Shaw, T., Hearn, L., Epstein, M., & Monks, H. (2009). Australian covert bullying prevalence study. Retrieved from https:\/\/docs.education.gov.au\/system\/files\/doc\/other\/australian_covert_bullying_prevalence_study_executive_summary.pdf"},{"key":"IJT.2019070103-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.009"},{"key":"IJT.2019070103-14","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"IJT.2019070103-15","unstructured":"Ditch the Label. (2017). The annual cyberbullying survey. Retrieved from https:\/\/www.ditchthelabel.org\/wp-content\/uploads\/2017\/07\/The-Annual-Bullying-Survey-2017-1.pdf"},{"key":"IJT.2019070103-16","unstructured":"Facebook. (2016). Company info. Retrieved from http:\/\/newsroom.fb.com\/company-info\/"},{"journal-title":"Safe Practices for Life Online: A Guide for Middle and High School","year":"2009","author":"D.Fodeman","key":"IJT.2019070103-17"},{"key":"IJT.2019070103-18","doi-asserted-by":"publisher","DOI":"10.12968\/bjsn.2014.9.3.147"},{"key":"IJT.2019070103-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2013.03.030"},{"key":"IJT.2019070103-20","unstructured":"Ganesan, K. (2014). All about stop words for text mining and information retrieval. Retrieved from http:\/\/text-analytics101.rxnlp.com\/2014\/10\/all-about-stop-words-for-text-mining.html"},{"journal-title":"The Oxford handbook of Internet studies","year":"2013","author":"E.Hargittai","key":"IJT.2019070103-21"},{"key":"IJT.2019070103-22","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-015-9382-9"},{"key":"IJT.2019070103-23","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-14-396"},{"key":"IJT.2019070103-24","unstructured":"Jong, N. F. (2016). The Millennial differences regarding privacy & security perceptions on Facebook [Bachelor's thesis]. University of Twente."},{"key":"IJT.2019070103-25","doi-asserted-by":"crossref","unstructured":"Kazerooni, F., Taylor, S. H., Bazarova, N. N., & Whitlock, J. (2018). Cyberbullying Bystander Intervention: The Number of Offenders and Retweeting Predict Likelihood of Helping a Cyberbullying Victim. Journal of Computer-Mediated Communication. Retrieved from https:\/\/academic.oup.com\/jcmc\/advance-article\/doi\/10.1093\/jcmc\/zmy005\/4962534","DOI":"10.1093\/jcmc\/zmy005"},{"key":"IJT.2019070103-26","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.59.2.105"},{"key":"IJT.2019070103-27","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0588"},{"key":"IJT.2019070103-28","first-page":"72","article-title":"Regulating cyberbullying: A South Australian perspective.","volume":"16","author":"C.Langos","year":"2014","journal-title":"Flinders Law Journal"},{"key":"IJT.2019070103-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.013"},{"key":"IJT.2019070103-30","first-page":"627","article-title":"Sentiment analysis and subjectivity","author":"B.Liu","year":"2010","journal-title":"Handbook of Natural Language Processing"},{"key":"IJT.2019070103-31","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-022-6.ch001"},{"key":"IJT.2019070103-32","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2923.2010.03720.x"},{"key":"IJT.2019070103-33","doi-asserted-by":"publisher","DOI":"10.5817\/CP2013-3-5"},{"key":"IJT.2019070103-34","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197507"},{"issue":"2","key":"IJT.2019070103-35","first-page":"313","article-title":"Building a large annotated corpus of English: The Penn treebank.","volume":"19","author":"M. P.Marcus","year":"1993","journal-title":"Computational Linguistics"},{"key":"IJT.2019070103-36","doi-asserted-by":"crossref","unstructured":"Menesini, E., Nocentini, A., & Palladino, B. E. (2015). Conceptual, theoretical and methodological issues. Cyberbullying: From Theory to Intervention, 15.","DOI":"10.4324\/9781315680354-2"},{"key":"IJT.2019070103-37","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0040"},{"key":"IJT.2019070103-38","doi-asserted-by":"crossref","unstructured":"Menesini, E., Zambuto, V., & Palladino, B. E. (2017). Online and school-based programs to prevent cyberbullying among Italian adolescents: What works, why, and under which circumstances. Reducing Cyberbullying in Schools: International Evidence-Based Best Practices, 135.","DOI":"10.1016\/B978-0-12-811423-0.00010-9"},{"key":"IJT.2019070103-39","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2012.00460.x"},{"key":"IJT.2019070103-40","unstructured":"Mohammed, S. (2015). NRC emotion lexicon. Retrieved from http:\/\/saifmohammad.com\/WebPages\/NRC-Emotion-Lexicon.htm"},{"key":"IJT.2019070103-41","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-04-2016-0009"},{"key":"IJT.2019070103-42","doi-asserted-by":"crossref","DOI":"10.4324\/9781315577197","author":"P. G.Nixon","year":"2016","journal-title":"Digital Media Usage Across the Life Course"},{"issue":"2","key":"IJT.2019070103-43","first-page":"129","article-title":"Cyberbullying: Labels, behaviours and definition in three European countries.","volume":"20","author":"A.Nocentini","year":"2010","journal-title":"Journal of Psychologists and Counsellors in Schools"},{"key":"IJT.2019070103-44","unstructured":"Olweus, D. (1993) Bullying at School: What We Know and What We Can Do (Understanding Children's Worlds. Oxford: Blackwell."},{"key":"IJT.2019070103-45","doi-asserted-by":"publisher","DOI":"10.1177\/0886260515586363"},{"key":"IJT.2019070103-46","unstructured":"Osborne, J. L. (2018). The Legal Fight Against Cyber-Bullying. Retrieved from https:\/\/www.law.com\/njlawjournal\/2018\/02\/19\/the-legal-fight-against-cyber-bullying\/"},{"key":"IJT.2019070103-47","unstructured":"Pak, A., & Paroubek, P. (2010, May). Twitter as a corpus for sentiment analysis and opinion mining. In LREc, 10."},{"key":"IJT.2019070103-48","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815606369"},{"key":"IJT.2019070103-49","doi-asserted-by":"publisher","DOI":"10.1086\/210268"},{"key":"IJT.2019070103-50","doi-asserted-by":"publisher","DOI":"10.1080\/01449290110084683"},{"issue":"2","key":"IJT.2019070103-51","first-page":"51","article-title":"Cyberbullying: Experiences, impacts and coping strategies as described by Australian young people.","volume":"29","author":"M.Price","year":"2010","journal-title":"Youth Studies Australia"},{"key":"IJT.2019070103-52","unstructured":"Rayson, S. (2015). Like, comment, share? Why all Facebook interactions count. BuzzSumo. Retrieved from http:\/\/buzzsumo.com\/blog\/facebook-interactions-why-shares-likes-and-comments-all-count\/"},{"key":"IJT.2019070103-53","unstructured":"Sintaha, M., Bin Satter, S., Zawad, N., Swarnaker, C., & Hassan, A. (2016). Cyberbullying detection using sentiment analysis in social media. Retrieved from http:\/\/dspace.bracu.ac.bd\/xmlui\/bitstream\/handle\/10361\/6420\/13101123%2C%2013101258%2C%2013101283%2C%2013101290%20%26%2013101002_CSE.pdf?sequence=1&isAllowed=y"},{"key":"IJT.2019070103-54","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"IJT.2019070103-55","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"key":"IJT.2019070103-56","unstructured":"Smith, A. (2014). 6 new facts about Facebook. Pew Research Center. Retrieved from http:\/\/www.pewresearch.org\/fact-tank\/2014\/02\/03\/6-new-facts-about-facebook\/"},{"key":"IJT.2019070103-57","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"IJT.2019070103-58","doi-asserted-by":"publisher","DOI":"10.1177\/0907568200007002005"},{"key":"IJT.2019070103-59","unstructured":"Statista. (2017). Number of U.S. states with state cyber bullying laws as of August 2017, by policy. Retrieved from https:\/\/www.statista.com\/statistics\/291082\/us-states-with-state-cyber-bullying-laws-policy"},{"key":"IJT.2019070103-60","unstructured":"Steeves, V. (2014). Young Canadians in a Wired World. Retrieved from ttps:\/\/mediasmarts.ca\/sites\/mediasmarts\/files\/pdfs\/publication report\/full\/YCWWIII_Cyberbullying_FullReport.pdf"},{"key":"IJT.2019070103-61","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.002"},{"key":"IJT.2019070103-62","unstructured":"Stopbullying.gov. (2014). What is cyberbullying? StopBullying.gov. Retrieved from http:\/\/www.stopbullying.gov\/cyberbullying\/what-is-it\/index.html"},{"key":"IJT.2019070103-63","unstructured":"The Cybersmile Foundation. (2017). The laws for cyberbullying and online abuse. Retrieved from https:\/\/www.cybersmile.org\/advicehelp\/category\/cyberbullying-and-the-law"},{"key":"IJT.2019070103-64","unstructured":"The Stanford Natural Language Processing Group. (2016). Stanford Log-linear Part-Of-Speech Tagger. Retrieved from http:\/\/nlp.stanford.edu\/software\/tagger.shtml#About"},{"key":"IJT.2019070103-65","doi-asserted-by":"crossref","unstructured":"Thoren, E. M., Metze, B., B\u00fchrer, C., & Garten, L. (2013). Online support for parents of preterm infants: a qualitative and content analysis of Facebook \u2018preemie\u2019 groups. Archives of Disease in Childhood-Fetal and Neonatal Edition.","DOI":"10.1136\/archdischild-2012-303572"},{"key":"IJT.2019070103-66","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"IJT.2019070103-67","unstructured":"University of Arizona. (2017). Semantic Word Cloud Visualisation. Retrieved from http:\/\/wordcloud.cs.arizona.edu\/description.html"},{"key":"IJT.2019070103-68","doi-asserted-by":"publisher","DOI":"10.1177\/0165025408095553"},{"key":"IJT.2019070103-69","doi-asserted-by":"publisher","DOI":"10.1108\/JARHE-11-2012-0060"},{"key":"IJT.2019070103-70","doi-asserted-by":"crossref","unstructured":"Wang, W., Singh, S., Zeng, D., King, K., & Nema, S. (2007). Antibody structure, instability, and formulation. Retrieved from http:\/\/www.jpharmsci.org\/article\/S0022-3549(16)32163-3\/fulltext","DOI":"10.1002\/jps.20727"},{"key":"IJT.2019070103-71","doi-asserted-by":"publisher","DOI":"10.1016\/0890-4065(90)90012-W"},{"journal-title":"Cyberbullying and cyberthreats","year":"2007","author":"N.Willard","key":"IJT.2019070103-72"},{"key":"IJT.2019070103-73","unstructured":"Wolfinger, E. (2016). \u201cBut it\u2019s already public, right?\u201d: The ethics of using online data. News & Analysis. Retrieved from: http:\/\/datadrivenjournalism.net\/news_and_analysis\/but_its_already_public_right_the_ethics_of_using_online_data"},{"key":"IJT.2019070103-74","first-page":"656","article-title":"Learning from bullying traces in social media.","author":"J. M.Xu","year":"2012","journal-title":"Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies"},{"key":"IJT.2019070103-75","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=230342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T10:25:23Z","timestamp":1651832723000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJT.2019070103"}},"subtitle":["A Content Analysis of Facebook Groups Fighting Against Cyberbullying"],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":76,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijt.2019070103","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"type":"print","value":"1947-3451"},{"type":"electronic","value":"1947-346X"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}