Experiences of Cyber Harassment and Social Adjustment in Female University Students: Moderating Role of Self-Efficacy
The present study investigated the moderating role of self-efficacy in relationship between experiences of cyber harassment experiences and social adjustment in female university students. A purposive sample of 365 female students of universities in Lahore with age ranging from 17-30 years (M = 20.93, SD = 2.39) was taken. Urdu versions of Cyber Harassment Experience Scale (Ayub & Malik, 2017), Generalized Self-efficacy Scale (Schwarzer & Jerusalem, 1995), Bell?s Social Adjustment Scale (Bell, 1934), and Coping with Cyber Harassment Questionnaire-modified (Ayub & Malik, 2017) were used. The results showed that overall experience of cyber harassment was not related with social adjustment; however, one of its subscales unauthorized use of identity information showed negative relationship with social adjustment. Further, the results showed negative relationship between overall experiences of cyber harassment and self-efficacy, while a positive relationship was found between self-efficacy and social adjustment. The results of moderation through hierarchical regression indicated nonsignificant interaction between self-efficacy and unauthorized use of identity information subscale of experiences of cyber harassment. Further, internal coping and reporting response (external coping) positively and no. of social media friends negatively predicted social adjustment in female university students.
Abdullah, M. C., Elias M. R. & Jegak, U. (2009). Adjustment amongst first year students in a Malaysian University. European Journal of Social Sciences, 8(3), 13-20.
Abdullah, M. C., Elias, H., Uli, J., & Mahyuddin, R. (2010). Relationship between coping and university adjustment and academic achievement amongst first year undergraduates in a Malaysian public university. International Journal of Arts and Sciences, 3(11), 379-392.
Agatston, R., Kowalski, R., & Limber, S. (2007). Students? perspectives on cyber bullying. Journal of Adolescent Health, 41, 59-60.
Akcan, G., & Ozturk E. (2017). The investigation of predictors of cyberbullying and cyber victimization in university students. Forensic Research & Criminology International Journal, 4(5), 146-149. doi:10.15 406/frci j.20 17.04.00128 Al Jazeera English. (2016, December 13). Cyber harassment in Pakistan and what is being done about it [Video file]. Retrieved from https://ww w.youtu, be.com/watch?v=EUqYE3SjZg4
Anderson, T. (2004). Towards a theory of online learning. In T. Anderson, & F. Elloumi (Eds.), Theory and practice of online learning (pp.33-60). Alberta: Athabasca University Press. Adewuyi, E. O., & Adefemi, K. (2016). Behavior change communication using social media: A review. International Journal of Communication and Health, 9, 109-116. Aricak, T., Siyahhan, S., Uzunhasanoglu, S., Sarbeyoglu, A., Ciplak, S., Yimaz, N., & Memmedov, C. (2008). Cyber bullying among Turkish adolescents. Cyber Psychology & Behavior, 11, 253-261. doi:10.1089/ cpb.2007.0016 Aspinwall, L. G., & Taylor, S. E. (1992). Modeling cognitive adaptation: A longitudinal investigation of the impact of individual differences and coping on college judgment and performance. Journal of Personality and Social Psychology, 63(6), 989-1003. Avais, M. A., Wassan, A. A., Narejo, H., & Khan, J. A. (2014). Awareness regarding cyber victimization among students of university of Sindh, Jamshoro. International Journal of Asian Social Science, 4(5), 632-641. Ayub, S., & Malik, F. (2017). Experiences of cyber harassment, self-efficacy and social adjustment in female university students (Unpublished MPhil dissertation). Institute of Applied Psychology, University of the Punjab, Lahore, Pakistan.
Bandura, A. (1977). Social learning theory. England: Prentice Hall, Oxford
Bandura, A. (1982). Self-efficacy mechanisms in human agency. American Psychologist, 37, 122-147.
Bandura, A. (1994). Self-efficacy. Encyclopedia of Human Behavior, 4, 71- 81.
Beale, A. V., & Hall, K. P. (2007). Cyber Bullying: What school administrators and parents can do? Clearing House, 81(1), 8-12.
Bell, H. M. (1934). Manual for adjustment inventory, student form (for the students of high school and college age). California: Stanford University Press.
Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new Method for an old behavior. Journal of Educational Computing Research, 32(3), 265-277.
Beran, T. N., Rinaldi, C., Bickham, S. D., & Rich, M. (2012). Evidence for the need to support adolescents dealing with harassment and cyber-harassment: Prevalence, progression, and impact. School Psychology International, 33(5), 562-576. Biber, J. K., Doverspike, D., Baznik, D., Cober, A., & Ritter, B. A. (2002). Sexual harassment in online communications: Effects of gender and discourse medium. Cyber Psychology & Behavior, 5(1), 33-42. doi:10.1 089/109493102753685863 Bocij, P. (2004). Cyberstalking: Harassment in the Internet age and how to protect your family. Westport, USA: Greenwood Publishing Group, Inc. Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a juvenile population. Youth & Society, 44(4), 500-523.doi:10.1177/0044118X11407525
Chen, Y. F., & Peng, S. S. (2008). University students' internet use and its relationships with academic performance, interpersonal relationships, psychosocial adjustment, and self-evaluation. Cyber Psychology & Behavior, 11(4), 467-469. doi:10.1089/cpb.2007.0128.
Citron, D. K. (2014). Hate crimes in cyberspace. Cambridge, USA: Harvard University Press.
Dehue, E., Bolman, C., & Vollink, T. (2008) Cyberbullying: Youngsters' experiences and parental perception. Cyber Psychology and Behavior, 11, 217-223.
Eden, S., Heiman, T., & Olenik-Shemesh, D. (2016). Bully versus victim on the internet: The correlation with emotional-social characteristics. Education Informational Technology, 21(3), 699-713. doi:10.1007/s106 39-014-9348-2
Elias, H., Noordin, N., & Mahyuddin, R. H. (2010). Achievement motivation and self-efficacy in relation to adjustment among university students. Journal of Social Sciences, 6(3), 333-339.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of interpersonal Violence, 19(4), 468-475. doi:10.1177/088626 0503262083
Fitzgerald, L. F. (2005). Coping with Harassment Questionnaire- Modified (Unpublished technical report). Department of Psychology, University of Illinois.
Frank, M. A. (2009). Unwilling avatars: Idealism and discrimination in cyberspace. Columbia Journal of Gender & Law, 20, 224-261.
Gardner, D. (2019). The rise of cyberstalking and online harassment. Today’s Insurance Professionals, 76(1), 31-35.
Hafeez, E. (2014). Cyber harassment and its implications on youth in Pakistan. New Horizons, 8(2), 29-47. Hampel, P., & Petermann, F. (2006). Perceived stress, coping, and adjustment in adolescents. Journal of Adolescent Health, 38(4), 409-415. doi:10.1016/j.jadohealth.2005.02.014
Jain, A. (2005). Cyber crime: Issues, threats and management (2nd ed.). Dehli: Isha books Publishers
Jaishanksr, K. (2007). Establishing a theory of cybercrime. International Journal of Cyber Criminology, 1(2), 7-9. Jones, G. R. (1986). Socialization tactics, self-efficacy, and newcomers adjustment to organizations. Academy of Management Journal, 29, 262-279.
Keltikangas Järvinen, L., & Pakaslahti, L. (1999). Development of social problem solving strategies and changes in aggressive behavior: A 7 year follow up from childhood to late adolescence. Aggressive Behavior: Official Journal of the International Society for Research on Aggression, 25(4), 269-279.
Khaleghi, A., & Najafabadi, N. O. (2015). The role of stress management in self-efficacy: A case study in Tehran based science and research department of Islamic Azad university natural resources and agricultural faculty students. International Journal of Advanced Biological and Biomedical Research, 3(3), 303-308.
Kraft, E. M., & Wang, J. (2010). An exploratory study of the cyber bullying and cyber stalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Techno-ethics, 1(4), 74-91.
Long, S. K., Sulkowski, M. L., & Dempsey, A. G. (2012). Cyber victimization and psychosocial adjustment in youth. In L. Audrey, & N. Hutcherson (Eds.), Psychology of victimization (pp. 151-166). New York: Nova Science Publishers, Inc.
Magsi, H., Agha, N., & Magsi, I. (2017). Understanding cyber bullying in Pakistani context: Causes and effects on young Female university students in Sindh Province. New Horizons, 11(1), 103-110. Mehrjerdi, Y. Z. (2011). Radio frequency identification: The big role player in health care management. Journal of Health Organization and Management, 25(5), 490-505. doi:10.1108/14777261111161851 Memon, S., Mahar, S., Dhomeja, L. D., & Pirzado, F. (2015, June 8-9). Prospects and challenges for social media in Pakistan. Paper presented in International Conference on Cyber Situational Awareness, Data Analytics, and Assessment, London, UK. Milhorn, T. H. (2007). Cybercrime: How to avoid becoming a victim. USA: Universal-Publishers.
Mohsin, M. (2016). The cyber harassment of women in Pakistan. The Diplomat. Retrieved from http://thediplomat.com/2016/04/the-cyber-harassment-of-pakistans-women/
Moore, K. N. (2011). Cyberbullying: An exploratory study of adolescent girls' perspectives on technology's impact on relationships (Unpublished doctoral dissertation). Graduate School of Applied and Professional Psychology, Rutgers University, New Jersey, United States. Moss, S. (2008). Social role theory. Retrieved from www. psych-it.comau/Ps ychlopedia/article
National Response Center for Cyber Crimes. (2016). Cyber crimes. Retrieved from http://www.fia.gov.pk/en/NR3C.php
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyber bullying. Youth Violence and Juvenile Justice, 4(2), 148-169.
Pearlin, L. I. & Schooler, C. (1978). The structure of coping. Journal of Health and Social Behavior, 19(1), 2-21.
Piccirillo, C., & Demaray, M. K. (2016). Examining self-efficacy as a mediator on the relation between bullying role behaviors and academic success in early adolescence. Retrieved from https://pqdtopen. Proquest. com/pubnum/10193947.html
Razavian, S. M. (2005). The relationship of emotional intelligence with social adjustment and academic achievement of third grade middle school students in Tabriz (Unpublished master?s thesis). Educational Psychology, University of Tabriz, Tabriz.
Schwarzer, R., & Jerusalem, M. (1995). Generalized self-efficacy scale. In J. Weinman, S. Wright, & M. Johnston, Measures in health psychology: A user’s portfolio. Causal and control beliefs (pp.35-37). Windsor, UK: Nfer-Nelson
Schwarzer, R., Mueller, J., & Greenglass, E. (1999). Assessment of perceived general self-efficacy on the Internet: Data collection in cyberspace. Anxiety, Stress, and Coping, 12, 145-161.
Shabnam, N., Faruk, O., & Kamruzzaman, M. (2016). Underlying causes of cyber-criminality and victimization: An empirical study on students. Social Sciences, 5(1), 1-6. doi:10.11648/j.ss.20160501.11
Sinclair, K. O., Bauman, S., Poteat, V. P., Koenig, B., & Russell, S. T. (2012). Cyber and bias-based harassment: Associations with academic, substance use, and mental health problems. Journal of Adolescent Health, 50(1), 521-523. Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyber bullying: Its nature and impact in secondary school pupils. Journal of Child Psychology & Psychiatry, 49(4), 376-385. Smith, P. K., & Steffgen, G. (2013). Cyber bullying through the new media: Findings from an international network. New York: Psychology Press.
Strauser, D. R., Ketz, K., & Keim, J. (2002). The relationship between self-efficacy, locus of control and work personality. Journal of Rehabilitation, 68(1), 20-26. Tokunaga, R. (2010). Following you home from school: A critical review and synthesis of research on cyber bullying, victimization. Computers in Human Behavior, 26(3), 277-287. Vaezi, M., Vala, M., Souri, M., Mousavi, A., & Ghavamzadeh, A. (2016). Emotional, social, and occupational adjustment among oncology nurses. International Journal of Hematology-oncology and Stem Cell Research, 10(4), 195-199.
Vance, J. W. (2010). Cyber-harassment in higher education: Online learning environments (Unpublished doctoral dissertation). Faculty of the USC Rossier School of Education, University of Southern California, Los Angeles. Retrieved from http://digitallibrary.usc.edu/cdm/ref/collection /p15799coll127/id/309077
Wagner, H., Kim, A. J., & Gordon, L. (2013). Relationship between personal protective equipment, self-efficacy, and job satisfaction of women in the building trades. Journal of Construction Engineering and Management, 139(10), 401-425.
Wong, D. S., Chan, H. C., & Cheng, C. H. (2014). Cyber bullying perpetration and victimization among adolescents in Hong Kong. Children and Youth Services Review, 36, 133-140. doi:/10.1016/j.chil dyouth.2013.11.006
Wolak, J. D., Kimberly, J., Mitchell, K. J., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health, 41, 51-58. Ybarra, M. L., Mitchell, K. J., Wolak, J., & Finkelhor, D. (2006). Examining characteristics and associated distress related to internet harassment: Findings from the second youth internet safety survey. Pediatrics, 118, 1169-1177. doi:10.1542/peds.2006-0815