U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • World Psychiatry
  • v.22(1); 2023 Feb

Cyberbullying: next‐generation research

Elias aboujaoude.

1 Department of Psychiatry and Behavioral Sciences, Stanford University School of Medicine, Stanford CA, USA

Matthew W. Savage

2 School of Communication, San Diego State University, San Diego CA, USA

Cyberbullying, or the repetitive aggression carried out over elec­tronic platforms with an intent to harm, is probably as old as the Internet itself. Research interest in this behavior, variably named, is also relatively old, with the first publication on “cyberstalking” ap­pearing in the PubMed database in 1999.

Over two decades later, the broad contours of the problem are generally well understood, including its phenomenology, epidemiology, mental health dimensions, link to suicidality, and disproportionate effects on minorities and individuals with developmental disorders 1 . Much remains understudied, however. Here we call for a “next generation” of research addressing some important knowledge gaps, including those concerning self‐­cyberbullying, the bully‐victim phenomenon, the bystander role, the closing age‐based digital divide, cyberbullying subtypes and how they evolve with technology, the cultural specificities of cyberbullying, and especially the management of this behavior.

Defined as the anonymous online posting, sending or otherwise sharing of hurtful content about oneself, “self‐cyberbullying” or “digital self‐harm” has emerged as a new and troubling manifestation of cyberbullying. Rather than a fringe phenomenon, self‐cyberbullying is thought to affect up to 6% of middle‐ and high‐school students 2 . Is this a cry for help by someone who might attempt “real” self‐harm or even suicide if not urgently treated? Is it “attention‐seeking” in nature, meant to drive Internet traffic in a very congested social media landscape where it can be hard to get noticed and where “likes” are the currency of self‐worth? Research is needed to better characterize self‐cyberbullying, including how it relates to depression and offline self‐harm and suicide.

The bully‐victim phenomenon refers to the permeable boundaries between roles that can make it relatively easy for a cyberbullying victim to become a cyberbully and vice versa. Unlike traditional bullying, visible markers of strength are not a requirement in cyberbullying. Assuming the identity of the cyberbully is known, all that the victims need to attack back and become cyberbullies themselves is a digital platform and basic digital know‐how. Do cyberbullying victims feel in any way “empowered” by this permeability, as some do express in clinical settings? And does knowledge that perpetrators can be attacked back have any deterrent effect on them, or is the bi‐directional violence that can ensue an unmitigated race to the bottom that further impairs well‐being?

What of the bystander role? Depending on the platform, the audience witnessing a cyberbullying attack can potentially be limitless – attacks that go viral are an extreme example of this. While this can magnify the humiliation inflicted on the victim, it also introduces the possibility of enlisting bystanders to protect victims and push back against perpetrators. Research examining how to leverage bystanders as part of anti‐cyberbullying interventions would have significant management and public health utility.

Recent scholarship has brought attention to cyberbullying beyond the young age group. What had been called the “digital divide”, which in this context refers to the notion that children and adolescents are more active online and therefore at higher risk, has narrowed to the point where a significant risk of cyberbully­ing now appears to exist among college students and perhaps adults overall. Cyberbullying is no longer a middle‐ and high‐school problem, as suggested by a 30‐country United Nations‐sponsored survey that recruited nearly 170,000 youth up to 24 years of age and found that 33% of them had been victims of that behavior 3 . To better protect against cyberbullying and implement age‐appropriate interventions, new research should better delineate the upper limits of the high‐risk cyberbullying age bracket, if they exist.

There is also insufficient research into the culturally‐specific dimensions of cyberbullying. Co‐authoring analyses reveal that the most influential cyberbullying scholarship comes from the US, and that the top 5 universities in publication productivity are in the European Union 4 . Given the different relationship to violence across cultures and the diverging definitions of, and reactions to, trauma worldwide, a broader culturally‐centered research perspective is essential for a more thorough understanding of cyberbullying's global impact.

As we “zoom out” and investigate across cultures, we should also “zoom in” on the specific cyberbullying behavior. Are all cy­berbullying attacks similar in terms of prevalence, perpetrator and victim profiles, short‐ and long‐term consequences, and manage­­ment strategies? Several forms of cyberbullying have been iden­tified 5 , but their similarities and differences require elucidation, es­­­pecially as technology continues to change and new forms emerge. Therefore, future research should compare diverse behaviors, such as cyberstalking, “excluding” (deliberately leaving someone out), “doxing” (revealing sensitive information about the victim), “fraping” (using the victim's social media account to post inappropriate content under the victim's name), “masquerading” (creating a fake identity with which to attack the victim), “flaming” (posting insults against the victim), and sex‐based cyberbullying through the non‐consensual sending of sexual text messages or imagery. To better understand and address cyberbullying, we must explore its existing subtypes – some of which have only been described in blogs – and, as technology evolves, its emerging forms.

Most urgently, the lack of agreement upon “best practices” for the management of cyberbullying must be remedied. Expanding access to psychiatric and psychological care – given the mental health dimension of cyberbullying – is imperative, as is a better understanding of school‐based interventions, which remain the most popular management approach.

Data from school‐based studies suggest that programs which adopt a broad, ecological approach to the school‐wide climate and which include specific actions at the student, teacher and family levels are more effective than those delivered solely through classroom curricula or social skills trainings 6 . However, the best meta‐analytic evidence for school‐based programs demonstrates mostly short‐term effects 7 , while long‐term data suggest small benefits 8 . Further, success appears more likely when programs target cyberbullying specifically as opposed to general violence prevention 7 , and when they are delivered by technology‐savvy content experts as opposed to teachers 8 . Evidence also suggests that programs are most successful when they provide informational support through interactive modalities (e.g., peer tutoring, role playing, group discussion), and when they nurture stakeholder agency (e.g., offer quality teacher training programs, engage parents in program implementation) 9 .

Future research into cyberbullying management should expand on these findings and examine how management interfa­ces with the legislative process and with law enforcement when it comes to illegal behavior, including privacy breeches and serious threats.

Much has been learned about cyberbullying, but much remains to be explored. The knowledge gaps are all the more challenging given that Internet‐related technologies evolve at a breakneck pace and in a way that reveals new exploitable vulnerabilities. A­long with the previously cited statistic that no less than 33% of young people worldwide have been victimized 3 , this should give the field added urgency to “keep up” and investigate some under‐studied areas that are critical to a more nuanced understanding of cyberbullying and its effective management.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

futureinternet-logo

Article Menu

cyberbullying research paper example

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

A review on deep-learning-based cyberbullying detection.

cyberbullying research paper example

1. Introduction

  • We present a DL-based cyberbullying defense ecosystem with the help of a taxonomy. We also discuss data representation, models and frameworks for DL techniques.
  • We compare several RNN, CNN, attention, and their fusion-based cyberbullying detection studies in the existing literature.
  • We analyze several text and image datasets extracted from social media and virtual platforms related to cyberbullying detection.
  • We identify the challenges and open issues related to cyberbullying.

2. Related Works

3. methodology, 4. data representation techniques, 4.1. text data representation, 4.1.1. one-hot encoding, 4.1.2. tf-idf, 4.1.3. word2vec, 4.1.4. glove, 4.1.5. elmo, 4.1.6. fasttext, 4.1.7. bert, 4.1.8. efficacy of various embeddings for detecting cyberbullying, 4.2. image data representation, 4.2.1. cognitive image representation, 4.2.2. bsp representation, 4.2.3. bio-inspired model representation, 4.2.4. mps representation, 4.2.5. deep neural networks-based image representation [ 83 ], 4.2.6. optical character recognition (ocr), 5. deep-learning-based models, 5.1. deep neural network (dnn), 5.2. boltzmann machines (bms), 5.3. deep belief network (dbn), 5.4. deep autoencoder (dae), 5.5. generative adversarial network (gan), 5.6. recurrent neural network (rnn), 5.7. long short-term memory.

  • ⊗ —element wise multiplication;
  • ⊕ —element wise addition;
  • C t = current cell memory ;
  • C t − 1 = previous cell memory ;
  • o t = output gate ;
  • f t = forget gate ;
  • σ = sigmoid function ;
  • w , b = weight vectors ;
  • h t − 1 = previous cell output ;
  • x t = input vector ;
  • h t = current cell output .

5.8. Convolutional Neural Network (CNN)

5.9. hybrid models (lstm-cnn, cnn-lstm), 5.10. attention-based model, 5.10.1. transformers, 5.10.2. bert (bidirectional encoder representations from transformers), 5.10.3. hierarchical attention networks (han), 5.10.4. convolutional neural networks with attention (cnn-att), 5.10.5. long short-term memory networks with attention (lstm-att), 5.10.6. gated recurrent units with attention (gru-att).

DL ModelsUsed in Cyberbullying ApplicationsArea of ApplicationsLimitations
Deep Neural Network (DNN) [ ]Chats and Tweets [ ], Social networks’ text and image [ ]Speech Recognition, Image recognition and the natural language processingRequires large amount of data, expensive to train, and issues of overfitting
Boltzmann Machines (BMs) [ ]Offline content [ ], Image content [ ], Arabic content [ ]Emotion recognition from thermal images, estimation of music similarity, extracting the structure of explored dataTraining is challenging, and weight adjustment is hard
Deep Belief Networks (DBN) [ ]Arabic content [ ], Social media text [ ], Social media image [ ]Image classification, natural language understanding, speech recognition to audio classificationExpensive to train because of the complex data models, huge data is required, and needs classifiers to grasp the output
Deep Autoencoder (DAE) [ ]Chats and Tweets [ ], Social media content [ ]Image search and data compression, dimensionality reduction, image denoisingThe bottleneck layer is too narrow, lossy, and requires large amount of data
Generative Adversarial Networks (GAN) [ ]Web-application for detecting cyberbullying [ ]Improve astronomical images, gravitational lens simulation for dark matter exploration, excellent low resolution, generate realistic images and cartoon charactersNon-convergence, mode collapse, and diminished gradient
Recurrent Neural Networks (RNN) [ ]Social Commentary [ ], Cyberbert: Bert for cyber- bullying identification [ ], Identification and classification from social media [ ]Image captioning, time-series analysis, natural language processing, handwriting recognition, and machine translationThe gradation disappears and the problem explodes, difficult to train, and unable to handle very long sequences when tanh or ReLU is used as the activation function
Long Short-Term Memory (LSTM) [ ]Social media content [ , , ], Wikipedia, Twitter, Formspring and YouTube [ ], CyberBERT [ ], Bangla text [ ], Indonesian language [ ], Twitter [ , ]Time-series prediction, speech recognition, music composition, and pharmaceutical developmentTraining takes time, training requires more memory, easy to overfit, and Dropouts are much more difficult to implement in LSTMs
Bidirectional LSTM (Bi-LSTM)Social media content [ , , , , ], Visual contents [ ], Wikipedia, Twitter, Formspring and YouTube [ ], CyberBERT [ ], Bangla text [ ], Indonesian language [ ], Text and emoji data [ ], Facebook [ ], Twitter[ , ]Text classification, speech recognition, and forecasting modelsCostly as double LSTM cells are used, takes longer to train, and easy to overfit
Convolutional Neural Networks (CNN) [ ]Social media content [ , , , , , , ], Visual contents [ ], Twitter [ , , , , , , ], Formspring.me [ , ], Facebook [ ], Chats [ ], YouTube and Wikipedia [ ]Image processing, and object detectionSignificantly slower due to an operation such as maxpooling, large datasets are required to process, and train neural networks [ ]
Radial Basis Function Networks (RBFNs) [ ]Youtube content [ ], Formspring.me, MySpace, and YouTube content [ ]Classification, regression and time-series predictionClassification is slow because every node in the hidden layer needs to compute the RBF function
Multilayer Perceptrons (MLPs)Text and emoji data [ ]Speech recognition, image-recognition, and machine translationAs it is fully connected, there are too many parameters, each node is connected to another node in a very dense network, which creates redundancy and inefficiency
Self-Organizing Maps (SOMs) [ ]Social media content [ ]Data visualization for high dimensional dataRequires sufficient neuron weight to cluster inputs [ ]
Restricted Boltzmann Machines (RBMs) [ ]Turkish social media contents [ ], Arabic content [ ]Dimensionality reduction, classification, regression, feature learning, topic modeling, and collaborative filteringTraining is more difficult because it is difficult to calculate the energy gradient function, the CD-k algorithm used in RBM is not as well known as the backpropagation algorithm, weight adjustment
Gated Recurrent Units (GRU) [ ]Social Commentary [ ], Facebook and Twitter aggressive speech [ ], Bangla text [ ], Formspring.me, MySpace and YouTube content [ ]Sequence learning, Solved Vanishing–Exploding gradients problemSlow convergence and low learning efficiency
Attention-based model [ ]Twitter bullied text identification [ ], social media text analysis [ ], online textual harassment detection [ ], contextual textual bullies [ ], Instagram bullied text identification [ ], Abusive Bangla Comment detection [ ], Trait-based bullying detection [ ]The method provides a simple and efficient architecture with a fixed length vector to pay attention of a sentence’s high-level meaningThe model requires more weight parameters, which results in a longer training time

5.11. Performance Comparison of DL Models in Cyberbullying Detection

6. dl in cyberbullying detection, 7. deep learning frameworks, applicability of different dl frameworks, 8. datasets for experiments, 9. challenges, open issues, and future trends, 9.1. issues in dl.

  • Require a large amount of dataset: Large volumes of labeled data are required for DL. For example, the creation of self-driving cars involves millions of photos and hundreds of hours of video [ 198 ]. It is commonly known that data preparation consumes 80–90% of the time spent on ML development. Furthermore, even the strongest DL algorithms will struggle to function without good data and present weak performance to handle biased and unclean data during model training [ 199 ].
  • High computational power: DL takes a lot of computational power. The parallel design of high-performance GPUs is ideal for DL. When used in conjunction with clusters or cloud computing, this allows development teams to cut DL network time for training from weeks to hours or less [ 198 ].
  • Reasoning of prediction unexplainable: DL result prediction follows the Black-Box testing approach. Thus, it is not capable of making any explainable predictions. Since DL’s hidden weight and activation are non-interpretable, its predictions are considered as non-explainable [ 200 ].
  • Security issue: Preventing the DL models from security attacks is the biggest challenge nowadays. Based on the occurring time, there are two types of security attacks. One is poisoning attack, which occurs during the training period, and another one is evasion attack, which occurs during interference (after training). By corrupting the data with malicious examples, poisoning attacks compromise the training process. On the other hand, evasion attacks use adversarial examples to confuse the entire classification process [ 201 ].
  • Models are not adaptive: In the present world, data are very dynamic. Data are changing due to various factors, which may be constantly changing, such as location, time, and many other factors. However, DL models are built using a defined set, which is called the training dataset. Later, the performance of the model is measured by the data, which also comes from the same distribution of the training data, and eventually, the model performs well. Later, the same model may start performing poorly due to the changing the characteristics of the data, which are not entirely different, but have some variations from the training data. This is difficult to manage in DL to retrain the old models.

9.2. Challenges in Cyberbullying detection

  • Cultural diversity for cyberbullying: Language is one of the important parts of the culture of a nation. Since cyberbullying has become a common problem among different nations, we may not expect a good prediction model by using a dataset of one nation and testing over the dataset of another culturally varied nation.
  • Language challenge: Capturing context and analyzing the sentiment from different types of sentences is a difficult task and challenging work for cyberbullying detection. For example, “The image that you have sent so irritated me and I would rather not contact with you any longer!” is not easy to detect as cyberbullying without investigating from a rationale factor, albeit that model shows negative sentiment [ 26 ].
  • Dataset challenge: Retrieving data from social media is not an easy task, as it relates to private information. Moreover, social media sites do not share user data publicly. Due to these issues, it is hard to gather quality data from social sites, which causes the lack of quality data to improve learning. Another challenging task is to annotate or label the data because they require a domain expert to label the corpus [ 202 ].
  • Data representation challenge: Setting up an effective cyberbullying-detection system is difficult due to the need for human interaction and the nature of cyberbullying. Furthermore, the nature of cyberbullying is challenging to identify in the cyberbullying detection problem. The vast majority of the exploratory works directly identified bullying words in social media. However, separating content-based features have their own difficulties. For the absence of appropriate information, the performance of the model might decay [ 203 ].
  • Natural Language Processing (NLP) challenges: The biggest challenge in natural language processing is understanding the meaning of the text. The relevant task is to build the right vocabulary, link the various components of the vocabulary, establish context, and extract semantic meaning from the data [ 204 ]. Misspelling and ambiguous expressions are other challenges that are very difficult to solve for the machine.
  • Reusability of pre-trained model for sentiment analysis and cyberbullying: Although cyberbullying detection and sentiment analysis are related tasks, these two tasks have significant differences from each other; therefore, the pre-trained model of one task is likely to be difficult to use to predict another task. Sentiment analysis involves determining the overall emotional tone of a text, where the sentence is positive, negative, or neutral. On the contrary, cyberbullying detection involves identifying specific patterns of harmful words. Yet, there are some sentiment analysis approaches that can be used to identify cyberbullying. Atoum et al. [ 205 ] proposed an approach for detecting cyberbullying using sentiment analysis techniques. Nahar et al. [ 206 ] presented a novel method for identifying online bullying on social media sites from sentiment analysis. Dani et al. [ 207 ] presented a novel framework for supervised learning that uses sentiment analysis to identify cyberbullying. Overall, while sentiment analysis models may be helpful for cyberbullying detection, they cannot be directly reused without significant modifications and additional training. Cyberbullying detection (i.e., yes/no classes) largely needs to identify negative words, which are used to harass a person, while sentiment analysis has three different classes (i.e., negative, positive, and neutral) where negative patterns are part of the problem. In this case, positive and neutral categories are also dominant class labels. Since the nature of the outputs is different in two different problems, we cannot completely reuse one pre-trained model for other cases.

9.3. Future Trends

  • Multilingual and multimedia content: In current times, social media and other virtual platforms are widely used among different levels of users in terms of age group, culture, language, taste, education, etc. Since social media is a vital platform for propagating cyber harassment, users may use multilingual and multimedia content; therefore, we may put more attention on building efficient cyberbullying detection systems for multilingual and multimedia content.
  • Cyberbullying detection-specific word embedding: In recent times, researchers are introducing different domain specific word-embedding techniques, because these platforms produce accurate results for relevant sets of vocabularies. For example, Med-BERT is used for health-domain-based BERT-aware embedding systems. In this connection, researchers may propose a specialized word-embedding system for cyberbullying detection problems.
  • Cyberbullying detection in SMS and email: Users are concerned with combating cyberbullying problems, which largely propagate through social media platforms. However, future researchers may put more attention on investigating Short Message Service (SMS)- and email-based cyberbullying detection methods.
  • Cyberbullying impact on mental health: Cyberbullying may leave a long-term impact on the mental status of an individual. Some may take a life-threatening step or commit self-injury to curb the severity of the harassment and take death for granted. Therefore, mental health researchers can consider this issue as a timely topic and introduce different methods to fight against cyber harassment.
  • Use of cutting-edge deep learning: With the advancement of deep-learning-based methods, we may introduce more subtle and delicate techniques to detect cyberbullying problems. For example, stacked and multi-channel CNN or Bi-LSTM-based cyberbullying-based frameworks or their advanced version or hybridization of these models may produce more sophisticated solutions to counter the problems.

10. Conclusions

Author contributions, data availability statement, conflicts of interest.

  • Feinberg, T.; Robey, N. Cyberbullying. Educ. Dig. 2009 , 74 , 26. [ Google Scholar ]
  • Marwa, T.; Salima, O.; Souham, M. Deep learning for online harassment detection in tweets. In Proceedings of the 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS), Tebessa, Algeria, 24–25 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [ Google Scholar ]
  • Nikolaou, D. Does cyberbullying impact youth suicidal behaviors? J. Health Econ. 2017 , 56 , 30–46. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Brailovskaia, J.; Teismann, T.; Margraf, J. Cyberbullying, positive mental health and suicide ideation/behavior. Psychiatry Res. 2018 , 267 , 240–242. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Lu, N.; Wu, G.; Zhang, Z.; Zheng, Y.; Ren, Y.; Choo, K.K.R. Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts. Concurr. Comput. Pract. Exp. 2020 , 32 , e5627. [ Google Scholar ] [ CrossRef ]
  • Paul, S.; Saha, S.; Hasanuzzaman, M. Identification of cyberbullying: A deep learning based multimodal approach. Multimed. Tools Appl. 2020 , 81 , 26989–27008. [ Google Scholar ] [ CrossRef ]
  • Buan, T.A.; Ramachandra, R. Automated cyberbullying detection in social media using an svm activated stacked convolution lstm network. In Proceedings of the 2020 the 4th International Conference on Compute and Data Analysis, Silicon Valley, CA, USA, 9–12 March 2020; pp. 170–174. [ Google Scholar ]
  • Cho, K.; Van Merriënboer, B.; Gulcehre, C.; Bahdanau, D.; Bougares, F.; Schwenk, H.; Bengio, Y. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv 2014 , arXiv:1406.1078. [ Google Scholar ]
  • Gers, F.A.; Schmidhuber, J.; Cummins, F. Learning to forget: Continual prediction with LSTM. Neural Comput. 2000 , 12 , 2451–2471. [ Google Scholar ] [ CrossRef ]
  • Huang, Z.; Xu, W.; Yu, K. Bidirectional LSTM-CRF models for sequence tagging. arXiv 2015 , arXiv:1508.01991. [ Google Scholar ]
  • Caroppo, A.; Leone, A.; Siciliano, P. Comparison between deep learning models and traditional machine learning approaches for facial expression recognition in ageing adults. J. Comput. Sci. Technol. 2020 , 35 , 1127–1146. [ Google Scholar ] [ CrossRef ]
  • Yilmaz, A.; Demircali, A.A.; Kocaman, S.; Uvet, H. Comparison of Deep Learning and Traditional Machine Learning Techniques for Classification of Pap Smear Images. arXiv 2020 , arXiv:2009.06366. [ Google Scholar ]
  • Finizola, J.S.; Targino, J.M.; Teodoro, F.G.S.; Moraes Lima, C.A.d. A comparative study between deep learning and traditional machine learning techniques for facial biometric recognition. In Proceedings of the Ibero-American Conference on Artificial Intelligence, Trujillo, Peru, 13–16 November 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 217–228. [ Google Scholar ]
  • Banerjee, V.; Telavane, J.; Gaikwad, P.; Vartak, P. Detection of cyberbullying using Deep Neural Network. In Proceedings of the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 15–16 March 2019; IEEE: PIscataway, NJ, USA, 2019; pp. 604–607. [ Google Scholar ]
  • Kamath, C.N.; Bukhari, S.S.; Dengel, A. Comparative study between traditional machine learning and deep learning approaches for text classification. In Proceedings of the ACM Symposium on Document Engineering 2018, Halifax, NS, Canada, 28–31 August 2018; pp. 1–11. [ Google Scholar ]
  • Wang, P.; Fan, E.; Wang, P. Comparative analysis of image classification algorithms based on traditional machine learning and deep learning. Pattern Recognit. Lett. 2021 , 141 , 61–67. [ Google Scholar ] [ CrossRef ]
  • Naufal, M.F.; Kusuma, S.F.; Prayuska, Z.A.; Yoshua, A.A.; Lauwoto, Y.A.; Dinata, N.S.; Sugiarto, D. Comparative Analysis of Image Classification Algorithms for Face Mask Detection. J. Inf. Syst. Eng. Bus. Intell. 2021 , 7 , 56–66. [ Google Scholar ] [ CrossRef ]
  • Ahmed, M.T.; Rahman, M.; Nur, S.; Islam, A.; Das, D. Deployment of machine learning and deep learning algorithms in detecting cyberbullying in bangla and romanized bangla text: A comparative study. In Proceedings of the 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, 19–20 February 2021; IEEE: PIscataway, NJ, USA, 2021; pp. 1–10. [ Google Scholar ]
  • Rezvani, N.; Beheshti, A.; Tabebordbar, A. Linking textual and contextual features for intelligent cyberbullying detection in social media. In Proceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia, Chiang Mai, Thailand, 30 November–2 December 2020; pp. 3–10. [ Google Scholar ]
  • Al-Ajlan, M.A.; Ykhlef, M. Deep learning algorithm for cyberbullying detection. Int. J. Adv. Comput. Sci. Appl 2018 , 9 , 199–205. [ Google Scholar ] [ CrossRef ]
  • Iwendi, C.; Srivastava, G.; Khan, S.; Maddikunta, P.K.R. Cyberbullying detection solutions based on deep learning architectures. Multimed. Syst. 2020 , 1–14. [ Google Scholar ] [ CrossRef ]
  • Paul, S.; Saha, S. CyberBERT: BERT for cyberbullying identification. Multimed. Syst. 2022 , 28 , 1897–1904. [ Google Scholar ] [ CrossRef ]
  • Akhter, M.P.; Jiangbin, Z.; Naqvi, I.R.; AbdelMajeed, M.; Zia, T. Abusive language detection from social media comments using conventional machine learning and deep learning approaches. Multimed. Syst. 2022 , 28 , 1925–1940. [ Google Scholar ] [ CrossRef ]
  • Picon, A.; Alvarez-Gila, A.; Irusta, U.; Echazarra, J. Why deep learning performs better than classical machine learning? Dyna Ing. Ind. 2020 , 95 , 119–122. [ Google Scholar ] [ CrossRef ]
  • Dadvar, M.; Eckert, K. Cyberbullying detection in social networks using deep learning based models; a reproducibility study. arXiv 2018 , arXiv:1812.08046. [ Google Scholar ]
  • Salawu, S.; He, Y.; Lumsden, J. Approaches to automated detection of cyberbullying: A survey. IEEE Trans. Affect. Comput. 2017 , 11 , 3–24. [ Google Scholar ] [ CrossRef ]
  • Rosa, H.; Pereira, N.; Ribeiro, R.; Ferreira, P.C.; Carvalho, J.P.; Oliveira, S.; Coheur, L.; Paulino, P.; Simão, A.V.; Trancoso, I. Automatic cyberbullying detection: A systematic review. Comput. Hum. Behav. 2019 , 93 , 333–345. [ Google Scholar ] [ CrossRef ]
  • Kim, S.; Razi, A.; Stringhini, G.; Wisniewski, P.J.; De Choudhury, M. A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms. Proc. ACM Hum.-Comput. Interact. 2021 , 5 , 1–34. [ Google Scholar ] [ CrossRef ]
  • Elsafoury, F.; Katsigiannis, S.; Pervez, Z.; Ramzan, N. When the Timeline Meets the Pipeline: A Survey on Automated Cyberbullying Detection. IEEE Access 2021 , 9 , 103541–103563. [ Google Scholar ] [ CrossRef ]
  • Haidar, B.; Chamoun, M.; Yamout, F. Cyberbullying detection: A survey on multilingual techniques. In Proceedings of the 2016 European Modelling Symposium (EMS), Pisa, Italy, 28–30 November 2016; pp. 165–171. [ Google Scholar ]
  • Al-Garadi, M.A.; Hussain, M.R.; Khan, N.; Murtaza, G.; Nweke, H.F.; Ali, I.; Mujtaba, G.; Chiroma, H.; Khattak, H.A.; Gani, A. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges. IEEE Access 2019 , 7 , 70701–70718. [ Google Scholar ] [ CrossRef ]
  • Mikolov, T.; Chen, K.; Corrado, G.; Dean, J. Efficient estimation of word representations in vector space. arXiv 2013 , arXiv:1301.3781. [ Google Scholar ]
  • Mikolov, T.; Sutskever, I.; Chen, K.; Corrado, G.S.; Dean, J. Distributed representations of words and phrases and their compositionality. Adv. Neural Inf. Process. Syst. 2013 , 26 . [ Google Scholar ]
  • Pennington, J.; Socher, R.; Manning, C.D. Glove: Global vectors for word representation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, 25–29 October 2014; pp. 1532–1543. [ Google Scholar ]
  • Peters, M.E.; Neumann, M.; Iyyer, M.; Gardner, M.; Clark, C.; Lee, K.; Zettlemoyer, L. Deep contextualized word representations. arXiv 2018 , arXiv:1802.05365. [ Google Scholar ] [ CrossRef ]
  • Joulin, A.; Grave, E.; Bojanowski, P.; Mikolov, T. Bag of tricks for efficient text classification. arXiv 2016 , arXiv:1607.01759. [ Google Scholar ]
  • Devlin, J.; Chang, M.W.; Lee, K.; Toutanova, K. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv 2018 , arXiv:1810.04805. [ Google Scholar ]
  • Ramos, J. Using tf-idf to determine word relevance in document queries. In Proceedings of the First Instructional Conference on Machine Learning ; Rutgers University: Piscataway, NJ, USA, 2003; Volume 242, pp. 29–48. [ Google Scholar ]
  • Ackley, D.H.; Hinton, G.E.; Sejnowski, T.J. A learning algorithm for Boltzmann machines. Cogn. Sci. 1985 , 9 , 147–169. [ Google Scholar ] [ CrossRef ]
  • Hinton, G.E. Deep belief networks. Scholarpedia 2009 , 4 , 5947. [ Google Scholar ] [ CrossRef ]
  • Baldi, P. Autoencoders, unsupervised learning, and deep architectures. In Proceedings of the ICML Workshop on Unsupervised and Transfer Learning, Bellevue, WA, USA, 2 July 2011; pp. 37–49. [ Google Scholar ]
  • Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial nets. Adv. Neural Inf. Process. Syst. 2014 , 27 . [ Google Scholar ]
  • Albawi, S.; Mohammed, T.A.; Al-Zawi, S. Understanding of a convolutional neural network. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–6. [ Google Scholar ]
  • Mikolov, T.; Karafiát, M.; Burget, L.; Cernockỳ, J.; Khudanpur, S. Recurrent neural network based language model. In Proceedings of the Interspeech, Makuhari, Japan, 26–30 September 2010; Volume 2, pp. 1045–1048. [ Google Scholar ]
  • Al-Harigy, L.M.; Al-Nuaim, H.A.; Moradpoor, N.; Tan, Z. Building toward Automated Cyberbullying Detection: A Comparative Analysis. Comput. Intell. Neurosci. 2022 , 2022 , 4794227. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Riadi, I.; Widiandana, P. Mobile Forensics for Cyberbullying Detection using Term Frequency-Inverse Document Frequency (TF-IDF). J. Eng. Sci. Technol. 2019 , 5 , 68–76. [ Google Scholar ] [ CrossRef ]
  • Rahman, S.; Talukder, K.H.; Mithila, S.K. An Empirical Study to Detect Cyberbullying with TF-IDF and Machine Learning Algorithms. In Proceedings of the 2021 International Conference on Electronics, Communications and Information Technology (ICECIT), Khulna, Bangladesh, 14–16 September 2021; pp. 1–4. [ Google Scholar ]
  • Liu, Y.; Ott, M.; Goyal, N.; Du, J.; Joshi, M.; Chen, D.; Levy, O.; Lewis, M.; Zettlemoyer, L.; Stoyanov, V. Roberta: A robustly optimized bert pretraining approach. arXiv 2019 , arXiv:1907.11692. [ Google Scholar ]
  • Yani, M.A.A.; Maharani, W. Analyzing Cyberbullying Negative Content on Twitter Social Media with the RoBERTa Method. JINAV J. Inf. Vis. 2023 , 4 . [ Google Scholar ]
  • Lan, Z.; Chen, M.; Goodman, S.; Gimpel, K.; Sharma, P.; Soricut, R. Albert: A lite bert for self-supervised learning of language representations. arXiv 2019 , arXiv:1909.11942. [ Google Scholar ]
  • Tripathy, J.K.; Chakkaravarthy, S.S.; Satapathy, S.C.; Sahoo, M.; Vaidehi, V. ALBERT-based fine-tuning model for cyberbullying analysis. Multimed. Syst. 2022 , 28 , 1941–1949. [ Google Scholar ] [ CrossRef ]
  • Clark, K.; Luong, M.T.; Le, Q.V.; Manning, C.D. Electra: Pre-training text encoders as discriminators rather than generators. arXiv 2020 , arXiv:2003.10555. [ Google Scholar ]
  • Sanh, V.; Debut, L.; Chaumond, J.; Wolf, T. DistilBERT, a distilled version of BERT: Smaller, faster, cheaper and lighter. arXiv 2019 , arXiv:1910.01108. [ Google Scholar ]
  • Harbaoui, A.; Benaissa, A.R. Cost-Sensitive PLM-based Approach for Arabic and English Cyberbullying Classification. Available at Research Square. 2023. Available online: https://www.researchsquare.com/article/rs-2524732/v1 (accessed on 6 April 2023).
  • Sokolová, Z.; Staš, J.; Juhár, J. Review of Recent Trends in the Detection of Hate Speech and Offensive Language on Social Media. Acta Electrotech. Inform. 2022 , 22 , 18–24. [ Google Scholar ]
  • Warke, O.; Jose, J.M.; Breitsohl, J. Utilising Twitter Metadata for Hate Classification. In Proceedings of the Advances in Information Retrieval: 45th European Conference on Information Retrieval, ECIR 2023, Dublin, Ireland, 2–6 April 2023; Proceedings, Part II. Springer: Berlin/Heidelberg, Germany, 2023; pp. 676–684. [ Google Scholar ]
  • Sun, Z.; Yu, H.; Song, X.; Liu, R.; Yang, Y.; Zhou, D. Mobilebert: A compact task-agnostic bert for resource-limited devices. arXiv 2020 , arXiv:2004.02984. [ Google Scholar ]
  • Mazari, A.C.; Boudoukhani, N.; Djeffal, A. BERT-based ensemble learning for multi-aspect hate speech detection. Clust. Comput. 2023 , 1–15. [ Google Scholar ] [ CrossRef ]
  • Coban, O.; Ozel, S.A.; Inan, A. Detection and cross-domain evaluation of cyberbullying in Facebook activity contents for Turkish. In ACM Transactions on Asian and Low-Resource Language Information Processing ; Association for Computing Machinery: New York, NY, USA, 2023; Volume 22. [ Google Scholar ]
  • Mozafari, M.; Farahbakhsh, R.; Crespi, N. A BERT-based transfer learning approach for hate speech detection in online social media. In Proceedings of the Complex Networks and Their Applications VIII: Volume 1 Proceedings of the Eighth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2019, Lisbon, Portugal, 10–12 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 928–940. [ Google Scholar ]
  • Feng, Z.; Su, J.; Cao, J. BHF: BERT-based Hierarchical Attention Fusion Network for Cyberbullying Remarks Detection. In Proceedings of the 2022 5th International Conference on Machine Learning and Natural Language Processing, Hangzhou, China, 23–25 September 2022; pp. 1–7. [ Google Scholar ]
  • Ishaq, A.; Malik, K.M.; Zafar, A. Hatespeechbert: Retraining Bert for Automatic Hate Speechdetection. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4329716 (accessed on 5 April 2023).
  • Gada, M.; Damania, K.; Sankhe, S. Cyberbullying Detection using LSTM-CNN architecture and its applications. In Proceedings of the 2021 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 27–29 January 2021; pp. 1–6. [ Google Scholar ]
  • Anindyati, L.; Purwarianti, A.; Nursanti, A. Optimizing deep learning for detection cyberbullying text in indonesian language. In Proceedings of the 2019 International Conference of Advanced Informatics: Concepts, Theory and Applications (ICAICTA), Yogyakarta, Indonesia, 20–21 September 2019; pp. 1–5. [ Google Scholar ]
  • Al-Hashedi, M.; Soon, L.K.; Goh, H.N. Cyberbullying detection using deep learning and word embeddings: An empirical study. In Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems, Bangkok Thailand, 23–25 November 2019; pp. 17–21. [ Google Scholar ]
  • Bu, S.J.; Cho, S.B. A hybrid deep learning system of CNN and LRCN to detect cyberbullying from SNS comments. In Proceedings of the International Conference on Hybrid Artificial Intelligence Systems, Oviedo, Spain, 20–22 June 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 561–572. [ Google Scholar ]
  • Al-Ajlan, M.A.; Ykhlef, M. Optimized twitter cyberbullying detection based on deep learning. In Proceedings of the 2018 21st Saudi Computer Society National Computer Conference (NCC), Riyadh, Saudi Arabia, 25–26 April 2018; pp. 1–5. [ Google Scholar ]
  • Agrawal, S.; Awekar, A. Deep learning for detecting cyberbullying across multiple social media platforms. In Proceedings of the European Conference on Information Retrieval, Grenoble, France, 26–29 March 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 141–153. [ Google Scholar ]
  • Azumah, S.W.; Elsayed, N.; ElSayed, Z.; Ozer, M. Cyberbullying in Text Content Detection: An Analytical Review. Available online: https://arxiv.org/pdf/2303.10502.pdf (accessed on 5 April 2023).
  • Bhatt, J. Using Hybrid Deep Learning and Word Embedding Based Approach for Advance Cyberbullying Detection. Ph.D Thesis, National College of Ireland, Dublin, Ireland, 2020. [ Google Scholar ]
  • Kumar, A.; Sachdeva, N. A Bi-GRU with attention and CapsNet hybrid model for cyberbullying detection on social media. World Wide Web 2022 , 25 , 1537–1550. [ Google Scholar ] [ CrossRef ]
  • Wang, K.; Cui, Y.; Hu, J.; Zhang, Y.; Zhao, W.; Feng, L. Cyberbullying detection, based on the fasttext and word similarity schemes. ACM Trans. Asian Low-Resour. Lang. Inf. Process. (TALLIP) 2020 , 20 , 1–15. [ Google Scholar ] [ CrossRef ]
  • Yadav, J.; Kumar, D.; Chauhan, D. Cyberbullying detection using pre-trained BERT model. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020; pp. 1096–1100. [ Google Scholar ]
  • Haidar, B.; Chamoun, M.; Serhrouchni, A. Arabic cyberbullying detection: Using deep learning. In Proceedings of the 2018 7th International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia, 19–20 September 2018; pp. 284–289. [ Google Scholar ]
  • Aldhyani, T.H.; Al-Adhaileh, M.H.; Alsubari, S.N. Cyberbullying identification system based deep learning algorithms. Electronics 2022 , 11 , 3273. [ Google Scholar ] [ CrossRef ]
  • Pericherla, S.; Ilavarasan, E. Performance analysis of word embeddings for cyberbullying detection. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Sanya, China, 12–14 November 2021; IOP Publishing: Bristol, UK, 2021; Volume 1085, p. 012008. [ Google Scholar ]
  • Eronen, J.; Ptaszynski, M.; Masui, F. Comparing Performance of Different Linguistically Backed Word Embeddings for Cyberbullying Detection. arXiv 2022 , arXiv:2206.01950. [ Google Scholar ]
  • Alhloul, A.; Alam, A. Bullying Tweets Detection Using CNN-Attention. Int. J. Cybern. Inform. (IJCI) 2023 , 12 , 65–78. [ Google Scholar ] [ CrossRef ]
  • Kountchev, R.; Rubin, S.; Milanova, M.; Todorov, V.; Kountcheva, R. Cognitive image representation based on spectrum pyramid decomposition. In Proceedings of the WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering (MMACTEE), Athens, Greece, 29–31 December 2008; pp. 230–235. [ Google Scholar ]
  • Sudirman, S.; Qiu, G. Colour image representation using BSP Tree. Proc. CGIP 2000 , 1–4. Available online: http://www.cs.nott.ac.uk/~pszqiu/Online/CGIP2000.pdf (accessed on 5 April 2023).
  • Wei, H.; Zuo, Q.; Lang, B. A bio-inspired model for image representation and image analysis. In Proceedings of the 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence, Boca Raton, FL, USA, 7–9 November 2011; pp. 409–413. [ Google Scholar ]
  • Xue, X.; Wu, X. Directly operable image representation of multiscale primal sketch. IEEE Trans. Multimed. 2005 , 7 , 805–816. [ Google Scholar ]
  • Gao, S.; Duan, L.; Tsang, I.W. DEFEATnet—A deep conventional image representation for image classification. IEEE Trans. Circuits Syst. Video Technol. 2015 , 26 , 494–505. [ Google Scholar ] [ CrossRef ]
  • Mori, S.; Suen, C.Y.; Yamamoto, K. Historical review of OCR research and development. Proc. IEEE 1992 , 80 , 1029–1058. [ Google Scholar ] [ CrossRef ]
  • Pradheep, T.; Sheeba, J.; Yogeshwaran, T.; Pradeep Devaneyan, S. Automatic Multi Model Cyber Bullying Detection from Social Networks. In Proceedings of the International Conference on Intelligent Computing Systems (ICICS 2017), Irbid, Jordan, 15–16 September 2017; Sona College of Technology: Tamil Nadu, Idia, 2017. [ Google Scholar ]
  • Sheeba, J.; Devaneyan, S.P. Impulsive intermodal cyber bullying recognition from public nets. Int. J. Adv. Res. Comput. Sci. 2018 , 9 . [ Google Scholar ]
  • Kumari, K.; Singh, J.P.; Dwivedi, Y.K.; Rana, N.P. toward Cyberbullying-free social media in smart cities: A unified multi-modal approach. Soft Comput. 2020 , 24 , 11059–11070. [ Google Scholar ] [ CrossRef ]
  • Verge, T. Instagram’s Bullying Comment Filter Hides Mean Comments. 2018. Available online: https://www.theverge.com/2018/5/1/17307980/instagram-bullying-comment-filter-machine-learning (accessed on 8 March 2023).
  • Facebook. Inside Feed: Fighting Abuse. 2018. Available online: https://about.fb.com/news/2018/05/inside-feed-fighting-abuse/ (accessed on 8 March 2023).
  • Gao, X.; Han, Y.; Tang, Q.; Liu, Z.; Ma, J. Chinese cyberbullying detection with OCR and deep learning. J. Intell. Fuzzy Syst. 2021 , 40 , 4731–4743. [ Google Scholar ]
  • Borah, N.; Borah, P. Detecting cyberbullying on social media using OCR and machine learning. In Proceedings of the 4th International Conference on Intelligent Computing and Control Systems (ICICCS 2020), Madurai, India, 13–15 May 2020; pp. 300–305. [ Google Scholar ]
  • Schmidhuber, J. Deep learning in neural networks: An overview. Neural Netw. 2015 , 61 , 85–117. [ Google Scholar ] [ CrossRef ]
  • Srivastava, N.; Hinton, G.; Krizhevsky, A.; Sutskever, I.; Salakhutdinov, R. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 2014 , 15 , 1929–1958. [ Google Scholar ]
  • Prechelt, L. Early stopping-but when? In Neural Networks: Tricks of the Trade ; Springer: Berlin/Heidelberg, Germany, 1998; pp. 55–69. [ Google Scholar ]
  • Das, H.S.; Roy, P. A deep dive into deep learning techniques for solving spoken language identification problems. In Intelligent Speech Signal Processing ; Elsevier: Amsterdam, The Netherlands, 2019; pp. 81–100. [ Google Scholar ]
  • Hinton, G.E. A practical guide to training restricted Boltzmann machines. In Neural networks: Tricks of the Trade ; Springer: Berlin/Heidelberg, Germany, 2012; pp. 599–619. [ Google Scholar ]
  • Salakhutdinov, R.; Hinton, G. Deep Boltzmann Machines. In Proceedings of the Twelth International Conference on Artificial Intelligence and Statistics, Clearwater Beach, FL, USA, 16–18 April 2009; van Dyk, D., Welling, M., Eds.; Proceedings of Machine Learning Research. PMLR, Hilton Clearwater Beach Resort: Clearwater, FL, USA, 2009; Volume 5, pp. 448–455. [ Google Scholar ]
  • Courville, A.; Bergstra, J.; Bengio, Y. A spike and slab restricted Boltzmann machine. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, Fort Lauderdale, FL, USA, 11–13 April 2011; JMLR Workshop and Conference Proceedings. pp. 233–241. [ Google Scholar ]
  • Hinton, G.E. Boltzmann machine. Scholarpedia 2007 , 2 , 1668. [ Google Scholar ] [ CrossRef ]
  • Bengio, Y.; Lamblin, P.; Popovici, D.; Larochelle, H. Greedy layer-wise training of deep networks. Adv. Neural Inf. Process. Syst. 2006 , 19 . [ Google Scholar ]
  • Li, C.; Wang, Y.; Zhang, X.; Gao, H.; Yang, Y.; Wang, J. Deep belief network for spectral–spatial classification of hyperspectral remote sensor data. Sensors 2019 , 19 , 204. [ Google Scholar ] [ CrossRef ]
  • Salakhutdinov, R.; Hinton, G. Semantic hashing. Int. J. Approx. Reason. 2009 , 50 , 969–978. [ Google Scholar ] [ CrossRef ]
  • Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning ; MIT Press: Cambridge, MA, USA, 2016. [ Google Scholar ]
  • Hinton, G.E.; Salakhutdinov, R.R. Reducing the dimensionality of data with neural networks. Science 2006 , 313 , 504–507. [ Google Scholar ] [ CrossRef ]
  • Vachhani, B.; Bhat, C.; Das, B.; Kopparapu, S.K. Deep Autoencoder Based Speech Features for Improved Dysarthric Speech Recognition. In Proceedings of the Interspeech, Stockholm, Sweden, 20–24 August 2017; pp. 1854–1858. [ Google Scholar ]
  • Donahue, J.; Krähenbühl, P.; Darrell, T. Adversarial feature learning. arXiv 2016 , arXiv:1605.09782. [ Google Scholar ]
  • Makhzani, A.; Shlens, J.; Jaitly, N.; Goodfellow, I.; Frey, B. Adversarial autoencoders. arXiv 2015 , arXiv:1511.05644. [ Google Scholar ]
  • Feng, J.; Feng, X.; Chen, J.; Cao, X.; Zhang, X.; Jiao, L.; Yu, T. Generative adversarial networks based on collaborative learning and attention mechanism for hyperspectral image classification. Remote Sens. 2020 , 12 , 1149. [ Google Scholar ] [ CrossRef ]
  • Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997 , 9 , 1735–1780. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Hopfield, J.J. Hopfield network. Scholarpedia 2007 , 2 , 1977. [ Google Scholar ] [ CrossRef ]
  • Chung, J.; Gulcehre, C.; Cho, K.; Bengio, Y. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv 2014 , arXiv:1412.3555. [ Google Scholar ]
  • Rezvani, N.; Beheshti, A. toward Attention-Based Context-Boosted Cyberbullying Detection in social media. J. Data Intell. 2021 , 2 , 418–433. [ Google Scholar ] [ CrossRef ]
  • Pericherla, S.; Ilavarasan, E. Transformer network-based word embeddings approach for autonomous cyberbullying detection. Int. J. Intell. Unmanned Syst. 2021; ahead-of-print . [ Google Scholar ]
  • Ahmed, T.; Ivan, S.; Kabir, M.; Mahmud, H.; Hasan, K. Performance analysis of transformer-based architectures and their ensembles to detect trait-based cyberbullying. Soc. Netw. Anal. Min. 2022 , 12 , 99. [ Google Scholar ] [ CrossRef ]
  • Alotaibi, M.; Alotaibi, B.; Razaque, A. A multichannel deep learning framework for cyberbullying detection on social media. Electronics 2021 , 10 , 2664. [ Google Scholar ] [ CrossRef ]
  • Yafooz, W.M.; Al-Dhaqm, A.; Alsaeedi, A. Detecting Kids Cyberbullying Using Transfer Learning Approach: Transformer Fine-Tuning Models. In Kids Cybersecurity Using Computational Intelligence Techniques ; Springer International Publishing: Berlin, Germany, 2023. [ Google Scholar ]
  • Guo, X.; Anjum, U.; Zhan, J. Cyberbully Detection Using BERT with Augmented Texts. In Proceedings of the 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17–20 December 2022; pp. 1246–1253. [ Google Scholar ]
  • Cheng, L.; Guo, R.; Silva, Y.; Hall, D.; Liu, H. Hierarchical attention networks for cyberbullying detection on the instagram social network. In Proceedings of the 2019 SIAM International Conference on Data Mining, Calgary, AB, Canada, 2–4 May 2019; pp. 235–243. [ Google Scholar ]
  • Cheng, L.; Guo, R.; Silva, Y.N.; Hall, D.; Liu, H. Modeling temporal patterns of cyberbullying detection with hierarchical attention networks. ACM/IMS Trans. Data Sci. 2021 , 2 , 1–23. [ Google Scholar ] [ CrossRef ]
  • Sreelakshmi, K.; Premjith, B.; Soman, K.P. Detection of Hate Speech Text in Hindi-English Code-mixed Data. Procedia Comput. Sci. 2020 , 171 , 737–744. [ Google Scholar ] [ CrossRef ]
  • Aurpa, T.T.; Sadik, R.; Ahmed, M.S. Abusive Bangla comments detection on Facebook using transformer-based deep learning models. Soc. Netw. Anal. Min. 2022 , 12 , 24. [ Google Scholar ] [ CrossRef ]
  • Khan, S.; Fazil, M.; Sejwal, V.K.; Alshara, M.A.; Alotaibi, R.M.; Kamal, A.; Baig, A.R. BiCHAT: BiLSTM with deep CNN and hierarchical attention for hate speech detection. J. King Saud Univ.-Comput. Inf. Sci. 2022 , 34 , 4335–4344. [ Google Scholar ] [ CrossRef ]
  • Fang, Y.; Yang, S.; Zhao, B.; Huang, C. Cyberbullying detection in social networks using Bi-gru with self-attention mechanism. Information 2021 , 12 , 171. [ Google Scholar ] [ CrossRef ]
  • Maity, K.; Kumar, A.; Saha, S. A Multitask Multimodal Framework for Sentiment and Emotion-Aided Cyberbullying Detection. IEEE Internet Comput. 2022 , 26 , 68–78. [ Google Scholar ] [ CrossRef ]
  • Jang, B.; Kim, M.; Harerimana, G.; Kang, S.u.; Kim, J.W. Bi-LSTM model to increase accuracy in text classification: Combining Word2vec CNN and attention mechanism. Appl. Sci. 2020 , 10 , 5841. [ Google Scholar ] [ CrossRef ]
  • Jiang, M.; Liang, Y.; Feng, X.; Fan, X.; Pei, Z.; Xue, Y.; Guan, R. Text classification based on deep belief network and softmax regression. Neural Comput. Appl. 2018 , 29 , 61–70. [ Google Scholar ] [ CrossRef ]
  • Goroshin, R.; LeCun, Y. Saturating auto-encoders. arXiv 2013 , arXiv:1301.3577. [ Google Scholar ]
  • Dadvar, M.; Eckert, K. Cyberbullying detection in social networks using deep learning based models. In Proceedings of the International Conference on Big Data Analytics and Knowledge Discovery, Bratislava, Slovakia, 14–17 September 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 245–255. [ Google Scholar ]
  • Chandra, N.; Khatri, S.K.; Som, S. Cyberbullying detection using recursive neural network through offline repository. In Proceedings of the 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Nordia, India, 29–31 August 2018; pp. 748–754. [ Google Scholar ]
  • Elmezain, M.; Malki, A.; Ibrahim, G.; El-Sayed, A. Hybrid Deep Learning Model–Based Prediction of Images Related to Cyberbullying. Int. J. Appl. Math. Comput. Sci. 2022 , 32 , 323–334. [ Google Scholar ]
  • Chandrasekaran, S.; Singh Pundir, A.K.; Lingaiah, T.B. Deep Learning Approaches for Cyberbullying Detection and Classification on Social Media. Comput. Intell. Neurosci. 2022 , 2022 , 2163458. [ Google Scholar ]
  • Kumar, A.; Sachdeva, N. Cyberbullying detection on social multimedia using soft computing techniques: A meta-analysis. Multimed. Tools Appl. 2019 , 78 , 23973–24010. [ Google Scholar ] [ CrossRef ]
  • Sripada, N.K.; Sirikonda, S.; Areefa; Leena, G.; Sriabhinay, K. Web-application for detecting cyber bullying using machine learning approach. Proc. AIP Conf. Proc. 2022 , 2418 , 020082. [ Google Scholar ]
  • Agarwal, A.; Chivukula, A.S.; Bhuyan, M.H.; Jan, T.; Narayan, B.; Prasad, M. Identification and classification of cyberbullying posts: A recurrent neural network approach using under-sampling and class weighting. In Proceedings of the International Conference on Neural Information Processing, New Delhi, India, 22–26 November 2021; Springer: Berlin/Heidelberg, Germany, 2020; pp. 113–120. [ Google Scholar ]
  • Luo, Y.; Zhang, X.; Hua, J.; Shen, W. Multi-featured Cyberbullying Detection Based on Deep Learning. In Proceedings of the 2021 16th International Conference on Computer Science & Education (ICCSE), Lancaster, UK, 17–21 August 2021; pp. 746–751. [ Google Scholar ]
  • Golem, V.; Karan, M.; Šnajder, J. Combining shallow and deep learning for aggressive text detection. In Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018), Santa Fe, NM, USA, 25 August 2018; pp. 188–198. [ Google Scholar ]
  • Zhang, X.; Tong, J.; Vishwamitra, N.; Whittaker, E.; Mazer, J.P.; Kowalski, R.; Hu, H.; Luo, F.; Macbeth, J.; Dillon, E. Cyberbullying detection with a pronunciation based convolutional neural network. In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA, 18–20 December 2016; pp. 740–745. [ Google Scholar ]
  • O’Shea, K.; Nash, R. An introduction to convolutional neural networks. arXiv 2015 , arXiv:1511.08458. [ Google Scholar ]
  • Orr, M.J. Introduction to Radial Basis Function Networks ; Technical Report; Center for Cognitive Science, University of Edinburgh: Edinburgh, UK, 1996. [ Google Scholar ]
  • Çürük, E.; Acı, Ç.; Eşsiz, E.S. The effects of attribute selection in artificial neural network based classifiers on cyberbullying detection. In Proceedings of the 2018 3rd International Conference on Computer Science and Engineering (UBMK), Sarajevo, Bosnia and Herzegovina, 20–23 September 2018; pp. 6–11. [ Google Scholar ]
  • Çiğdem, A.; Çürük, E.; Eşsiz, E.S. Automatic detection of cyberbullying in formspring. me, Myspace and YouTube social networks. Turk. J. Eng. 2019 , 3 , 168–178. [ Google Scholar ]
  • Ritter, H.; Martinetz, T.; Schulten, K. Neural Computation and Self-Organizing Maps: An Introduction ; Addison-Wesley Reading: Boston, MA, USA, 1992. [ Google Scholar ]
  • Desai, A.; Kalaskar, S.; Kumbhar, O.; Dhumal, R. Cyber Bullying Detection on Social Media using Machine Learning. In Proceedings of the ITM Web of Conferences, Navi Mumbai, India, 14–15 July 2021; EDP Sciences: Ulis, France, 2021; Volume 40, p. 03038. [ Google Scholar ]
  • Miljković, D. Brief review of self-organizing maps. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017; pp. 1061–1066. [ Google Scholar ]
  • Bozyiğit, A.; Utku, S.; Nasiboğlu, E. Cyberbullying detection by using artificial neural network models. In Proceedings of the 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey, 11–15 September 2019; pp. 520–524. [ Google Scholar ]
  • Cho, K.; Van Merriënboer, B.; Bahdanau, D.; Bengio, Y. On the properties of neural machine translation: Encoder-decoder approaches. arXiv 2014 , arXiv:1409.1259. [ Google Scholar ]
  • de Santana Correia, A.; Colombini, E.L. Attention, please! A survey of neural attention models in deep learning. Artif. Intell. Rev. 2022 , 55 , 6037–6124. [ Google Scholar ] [ CrossRef ]
  • Zhang, A.; Li, B.; Wan, S.; Wang, K. Cyberbullying detection with birnn and attention mechanism. In Proceedings of the Machine Learning and Intelligent Communications: 4th International Conference, MLICOM 2019, Nanjing, China, 24–25 August 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 623–635. [ Google Scholar ]
  • Raj, C.; Agarwal, A.; Bharathy, G.; Narayan, B.; Prasad, M. Cyberbullying detection: Hybrid models based on machine learning and natural language processing techniques. Electronics 2021 , 10 , 2810. [ Google Scholar ] [ CrossRef ]
  • Bharti, S.; Yadav, A.K.; Kumar, M.; Yadav, D. Cyberbullying detection from tweets using deep learning. Kybernetes 2021 , 51 , 2695–2711. [ Google Scholar ] [ CrossRef ]
  • Murshed, B.A.H.; Abawajy, J.; Mallappa, S.; Saif, M.A.N.; Al-Ariki, H.D.E. DEA-RNN: A hybrid deep learning approach for cyberbullying detection in Twitter social media platform. IEEE Access 2022 , 10 , 25857–25871. [ Google Scholar ] [ CrossRef ]
  • Raj, M.; Singh, S.; Solanki, K.; Selvanambi, R. An application to detect cyberbullying using machine learning and deep learning techniques. SN Comput. Sci. 2022 , 3 , 401. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Beniwal, R.; Maurya, A. Toxic comment classification using hybrid deep learning model. In Proceedings of the Sustainable Communication Networks and Application: Proceedings of ICSCN 2020, Erode, India, 6–7 August 2020; Springer: Berlin/Heidelberg, Germany, 2021; pp. 461–473. [ Google Scholar ]
  • Singh, N.K.; Singh, P.; Chand, S. Deep Learning based Methods for Cyberbullying Detection on Social Media. In Proceedings of the 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, 4–5 November 2022; pp. 521–525. [ Google Scholar ]
  • Pang, B.; Nijkamp, E.; Wu, Y.N. Deep learning with tensorflow: A review. J. Educ. Behav. Stat. 2020 , 45 , 227–248. [ Google Scholar ] [ CrossRef ]
  • Borkan, D.; Dixon, L.; Sorensen, J.; Thain, N.; Vasserman, L. Nuanced metrics for measuring unintended bias with real data for text classification. In Proceedings of the Companion Proceedings of the 2019 World Wide Web Conference, San Francisco, CA, USA, 13–17 May 2019; pp. 491–500. [ Google Scholar ]
  • Huang, X.; Xing, L.; Dernoncourt, F.; Paul, M.J. Multilingual twitter corpus and baselines for evaluating demographic bias in hate speech recognition. arXiv 2020 , arXiv:2002.10361. [ Google Scholar ]
  • Wulczyn, E.; Thain, N.; Dixon, L. Ex machina: Personal attacks seen at scale. In Proceedings of the 26th International Conference on World Wide Web, Perth, Australia, 3–7 April 2017; pp. 1391–1399. [ Google Scholar ]
  • Kennedy, B.; Atari, M.; Davani, A.M.; Yeh, L.; Omrani, A.; Kim, Y.; Coombs, K.; Havaldar, S.; Portillo-Wightman, G.; Gonzalez, E.; et al. Introducing the Gab Hate Corpus: Defining and applying hate-based rhetoric to social media posts at scale. Lang. Resour. Eval. 2022 , 56 , 79–108. [ Google Scholar ] [ CrossRef ]
  • Gencoglu, O. Cyberbullying detection with fairness constraints. IEEE Internet Comput. 2020 , 25 , 20–29. [ Google Scholar ] [ CrossRef ]
  • Gulli, A.; Pal, S. Deep Learning with Keras ; Packt Publishing Ltd.: Birmingham, UK, 2017. [ Google Scholar ]
  • Kargutkar, S.; Chitre, V. Implementation of Cyberbullying Detection Using Machine Learning Techniques. Int. J. Res. Appl. Sci. Eng. Technol. 2021 , 9 , 290–294. [ Google Scholar ] [ CrossRef ]
  • Roy, P.K.; Mali, F.U. Cyberbullying detection using deep transfer learning. Complex Intell. Syst. 2022 , 8 , 5449–5467. [ Google Scholar ] [ CrossRef ]
  • Jain, V.; Kumar, V.; Pal, V.; Vishwakarma, D.K. Detection of cyberbullying on social media using machine learning. In Proceedings of the 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 8–10 April 2021; pp. 1091–1096. [ Google Scholar ]
  • Stevens, E.; Antiga, L.; Viehmann, T. Deep Learning with PyTorch ; Manning Publications: Shelter Island, NY, USA, 2020. [ Google Scholar ]
  • Pramanick, S.; Sharma, S.; Dimitrov, D.; Akhtar, M.S.; Nakov, P.; Chakraborty, T. MOMENTA: A multimodal framework for detecting harmful memes and their targets. arXiv 2021 , arXiv:2109.05184. [ Google Scholar ]
  • Sharma, S.; Akhtar, M.; Nakov, P.; Chakraborty, T. DISARM: Detecting the victims targeted by harmful memes. arXiv 2022 , arXiv:2205.05738. [ Google Scholar ]
  • Vishwamitra, N.; Hu, H.; Luo, F.; Cheng, L. toward understanding and detecting cyberbullying in real-world images. In Proceedings of the 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA), Online, 14–17 December 2020. [ Google Scholar ]
  • Brownlee, J. Deep Learning with Python: Develop Deep Learning Models on Theano and 1678 Tensor Flow Using Keras ; Machine Learning Mastery: Vermont, VIC, Australia, 2016. [ Google Scholar ]
  • Sintaha, M.; Satter, S.B.; Zawad, N.; Swarnaker, C.; Hassan, A. Cyberbullying Detection Using Sentiment Analysis in Social Media. Ph.D Thesis, BRAC University, Dhaka, Bangladesh, 2016. [ Google Scholar ]
  • Kumar, A.; Sachdeva, N. Multimodal cyberbullying detection using capsule network with dynamic routing and deep convolutional neural network. Multimed. Syst. 2021 , 28 , 2043–2052. [ Google Scholar ] [ CrossRef ]
  • Kumar, A.; Sachdeva, N. Multi-input integrative learning using Deep Neural Networks and 1684 transfer learning for cyberbullying detection in real-time code-mix data. Multimed. Syst. 2022 , 28 , 2027–2041. [ Google Scholar ] [ CrossRef ]
  • Jia, Y.; Shelhamer, E.; Donahue, J.; Karayev, S.; Long, J.; Girshick, R.; Guadarrama, S.; Darrell, T. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM International Conference on Multimedia, Orlando, FL, USA, 3–7 November 2014; pp. 675–678. [ Google Scholar ]
  • Tokui, S.; Okuta, R.; Akiba, T.; Niitani, Y.; Ogawa, T.; Saito, S.; Suzuki, S.; Uenishi, K.; Vogel, B.; Yamazaki Vincent, H. Chainer: A Deep Learning Framework for Accelerating the Research Cycle. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, 4–8 August 2019; ACM: NewYork, NY, USA, 2019; pp. 2002–2011. [ Google Scholar ]
  • Parvat, A.; Chavan, J.; Kadam, S.; Dev, S.; Pathak, V. A survey of deep-learning frameworks. In Proceedings of the 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 19–20 January 2017; pp. 1–7. [ Google Scholar ]
  • Neubig, G.; Dyer, C.; Goldberg, Y.; Matthews, A.; Ammar, W.; Anastasopoulos, A.; Ballesteros, M.; Chiang, D.; Clothiaux, D.; Cohn, T.; et al. Dynet: The dynamic neural network toolkit. arXiv 2017 , arXiv:1701.03980. [ Google Scholar ]
  • Hodnett, M.; Wiley, J.F. R Deep Learning Essentials: A Step-by-Step Guide to Building Deep Learning Models Using TensorFlow, Keras, and MXNet ; Packt Publishing Ltd.: Birmingham, UK, 2018. [ Google Scholar ]
  • Zaheri, S.; Leath, J.; Stroud, D. Toxic comment classification. SMU Data Sci. Rev. 2020 , 3 , 13. [ Google Scholar ]
  • Dieleman, S.; Schlüter, J.; Raffel, C.; Olson, E.; Sønderby, S.K.; Nouri, D. Lasagne: First Release ; Zenodo: Geneva, Switzerland, 2015. [ Google Scholar ]
  • Candel, A.; Parmar, V.; LeDell, E.; Arora, A. Deep learning with H2O ; H2O ai Inc.: Mountain View, CA, USA, 2016; pp. 1–21. [ Google Scholar ]
  • Tong, Z.; Du, N.; Song, X.; Wang, X. Study on MindSpore Deep Learning Framework. In Proceedings of the 2021 17th International Conference on Computational Intelligence and Security (CIS), Chengdu, China, 19–22 November 2020; pp. 183–186. [ Google Scholar ]
  • Zhao, Z.; Gao, M.; Luo, F.; Zhang, Y.; Xiong, Q. LSHWE: Improving similarity-based word embedding with locality sensitive hashing for cyberbullying detection. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19–24 July 2020; pp. 1–8. [ Google Scholar ]
  • Ahmed, M.F.; Mahmud, Z.; Biash, Z.T.; Ryen, A.A.N.; Hossain, A.; Ashraf, F.B. Cyberbullying detection using Deep Neural Network from social media comments in bangla language. arXiv 2021 , arXiv:2106.04506. [ Google Scholar ]
  • Dewani, A.; Memon, M.A.; Bhatti, S. Cyberbullying detection: Advanced preprocessing techniques & deep learning architecture for Roman Urdu data. J. Big Data 2021 , 8 , 160. [ Google Scholar ]
  • Paszke, A.; Gross, S.; Massa, F.; Lerer, A.; Bradbury, J.; Chanan, G.; Killeen, T.; Lin, Z.; Gimelshein, N.; Antiga, L.; et al. Pytorch: An imperative style, high-performance deep learning library. Adv. Neural Inf. Process. Syst. 2019 , 32 . [ Google Scholar ]
  • Collobert, R.; Bengio, S.; Mariéthoz, J. Torch: A modular Machine Learning Software Library ; Technical Report; Idiap: Maldini, Switzerland, 2002. [ Google Scholar ]
  • Patange, T.; Singh, J.; Thorve, A.; Somaraj, Y.; Vyawahare, M. Detection of Cyberhectoring on Instagram. In Proceedings of the Proceedings 2019: Conference on Technologies for Future Cities (CTFC), Pillai College of Engineering, New Panvel, India, 8–9 February 2019. [ Google Scholar ]
  • Shahane, P.; Gore, D. Detection of Fake Profiles on Twitter using Random Forest & Deep Convolutional Neural Network. Int. J. Manag. Technol. Eng. 2019 , 9 , 3663–3667. [ Google Scholar ]
  • Bhaskaran, J.; Kamath, A.; Paul, S. DISCo: Detecting Insults in Social Commentary. 2017. Available online: http://cs229.stanford.edu/proj2017/final-reports/5242067.pdf (accessed on 5 April 2023).
  • Waseem, Z.; Hovy, D. Hateful symbols or hateful people? predictive features for hate speech detection on twitter. In Proceedings of the NAACL Student Research Workshop, San Diego, CA, USA, 13–15 June 2016; pp. 88–93. [ Google Scholar ]
  • Kasture, A.S. A predictive Model to Detect Online Cyberbullying. Ph.D Thesis, Auckland University of Technology, Auckland, New Zealand, 2015. [ Google Scholar ]
  • Davidson, T.; Warmsley, D.; Macy, M.; Weber, I. Automated hate speech detection and the problem of offensive language. In Proceedings of the International AAAI Conference on Web and Social Media, Montreal, QC, Canada, 15–18 May 2017; Volume 11, pp. 512–515. [ Google Scholar ]
  • Dadvar, M.; Trieschnigg, D.; Jong, F.d. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Proceedings of the Canadian conference on artificial intelligence, Montreal, QC, USA, 6–9 May 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 275–281. [ Google Scholar ]
  • Toxic Comment Classification Challenge. Available online: https://www.kaggle.com/competitions/jigsaw-toxic-comment-classification-challenge/data (accessed on 5 April 2023).
  • Data and Code for the Study of Bullying. Available online: https://research.cs.wisc.edu/bullying/data.html (accessed on 5 April 2023).
  • Rafiq, R.I.; Hosseinmardi, H.; Han, R.; Lv, Q.; Mishra, S.; Mattson, S.A. Careful what you share in six seconds: Detecting cyberbullying instances in Vine. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, France, 25–28 August 2015; pp. 617–622. [ Google Scholar ]
  • Rafiq, R.I.; Hosseinmardi, H.; Mattson, S.A.; Han, R.; Lv, Q.; Mishra, S. Analysis and detection of labeled cyberbullying instances in Vine, a video-based social network. Soc. Netw. Anal. Min. 2016 , 6 , 88. [ Google Scholar ] [ CrossRef ]
  • Zohuri, B.; Moghaddam, M. Deep learning limitations and flaws. Mod. Approaches Mater. Sci 2020 , 2 , 241–250. [ Google Scholar ] [ CrossRef ]
  • Whang, S.; Lee, J.G. Data Collection and Quality Challenges for Deep Learning. In Proceedings of the VLDB Endowment, Online, 31 August–4 September 2020; VLDB Endowment: Los Angeles, CA, USA, 2020; Volume 13. [ Google Scholar ]
  • Pramod, A.; Naicker, H.S.; Tyagi, A.K. Machine learning and deep learning: Open issues and future research directions for the next 10 years. Computational Analysis and Deep Learning for Medical Care: Principles, Methods, and Applications ; John Wiley & Sons, Ltd.: Chichester, UK, 2021; pp. 463–490. [ Google Scholar ]
  • Bae, H.; Jang, J.; Jung, D.; Jang, H.; Ha, H.; Lee, H.; Yoon, S. Security and privacy issues in deep learning. arXiv 2018 , arXiv:1807.11655. [ Google Scholar ]
  • Raisi, E.; Huang, B. Cyberbullying identification using participant-vocabulary consistency. arXiv 2016 , arXiv:1606.08084. [ Google Scholar ]
  • Ali, W.N.H.W.; Mohd, M.; Fauzi, F. Cyberbullying detection: An overview. In Proceedings of the 2018 Cyber Resilience Conference (CRC), Putrajaya, Malaysia, 13–15 November 2018; pp. 1–3. [ Google Scholar ]
  • Weischedel, R.M.; Bates, M. Challenges in Natural Language Processing ; Cambridge University Press: Cambridge, UK, 2006. [ Google Scholar ]
  • Atoum, J.O. Cyberbullying Detection Through Sentiment Analysis. In Proceedings of the 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 16–18 December 2020; pp. 292–297. [ Google Scholar ]
  • Nahar, V.; Unankard, S.; Li, X.; Pang, C. Sentiment analysis for effective detection of cyber bullying. In Proceedings of the Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, 11–13 April 2012; Proceedings 14. Springer: Berlin/Heidelberg, Germany, 2012; pp. 767–774. [ Google Scholar ]
  • Dani, H.; Li, J.; Liu, H. Sentiment informed cyberbullying detection in social media. In Proceedings of the Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2017, Skopje, Macedonia, 18–22 September 2017; Proceedings, Part I 10. Springer: Berlin/Heidelberg, Germany, 2017; pp. 52–67. [ Google Scholar ]

Click here to enlarge figure

ReferenceDeep Learning ModelsMethod.Taxnom.Data
Represent.
Tech.
Framewrk.Dataset
(Pub.
Avail.)
Discussion in Challenges and Future Trends
Application
in
Cyberbullying
Strength
and
Limitation
TextImg.Cultural
Diversity
Data
Represent.
Multimedia
and
Multilingual
Content
Impact on
Mental
Health
[ ]N/A
[ ]
[ ]N/A
[ ]N/A
[ ]
[ ]
[ ]
Ours
ReferenceCollection SourcesKeywordsTimelineInitial Paper CountFinal Paper Count
[ ] ----
[ ]Scopus, the ACM Digital Library,
and the IEEE Xplore digital library
Cyberbully or cyberbullying detection,
detecting cyberbully or cyberbullying,
electronic or online bullying detection,
detecting electronic or online bullying,
cyberbullying prevention tool,
cyberbullying prevention software,
cyberbullying software, anti cyberbu-
llying detecting electronic or online
harassment
2008–20168946
[ ]Google Scholar, Research Gate, ACM
Digital Library, Arxiv, Scopus,
Mendeley
-2011–20187122
[ ]Scopus, Clarivate Analytics’ Web of
Science, DBLP Computer Science
Bibliography, ACM Digital Library,
ScienceDirect, SpringerLink, and 
IEEE Xplore, Qatar University’s
digital library
Cyberbullying, aggressive
behavior, big data, and 
cyberbullying models
--
[ ]Google Scholar, IEEE Xplore,
Science Direct, ACM Digital
Library and Wiley online databases
Cyberbullying detection2008–202010665
[ ]The ACM Digital Library, IEEE
Xplore Digital Library, and Springer
Link databases
Cyberbullying detection,
Cyberbullying detection
algorithm
2010–202011856
[ ]Google Scholar, IEEE, Springer, ACM,
and others
Abuse, offensive or hate speech,
sarcasm, and irony
2012–20207045
OursIEEE Xplore, ScienceDirect, ACM
Digital Library, Wiley, Springer Link,
Taylor & Francis, MDPI, etc.
Cyberbullying and deep
learning, cyberbullying
detection, cyberharassment
and deep learning,
social media and cyberbullying,
deep fake and cyberbullying
2017–Jan 2023133163
Word-Embedding TechniqueContext Sensitive EmbeddingML BasedRNN BasedTransformer BasedPretrainedUsed in Cyberbullying Application
One-hot EmbeddingNoNoNoNoNoYouTube Bengali text [ ]
TF-IDFNoNoNoNoNoChinese Weibo dataset and English tweets [ ], Twitter English text [ ], YouTube Bengali text [ ]
Word2VecNoYesNoNoYesTwitter Indonesian text [ ], Twitter English text [ , ], Social media text [ , ]
GloVeNoYesNoNoYesTwitter English text [ , , ], Formspring, Twitter, and Wikipedia posts [ , ], YouTube English text [ ], Social media text [ ]
ELMoYesYesYesNoYesSocial media text [ ], Formspring English text [ , , ], MySpace English text [ , ]
fastTextNoYesNoNoYesFormspring English text [ ], Social media text [ ]
BERTYesYesNoYesYesArabic Social media text [ ], Formspring, Twitter, Wikipedia English posts [ ]
StudyDatasetHybrid ModelExperimental ModelsBest Performing ModelPerformance Metrics
Raj
et al. [ ]
Wikipedia
Attack Dataset
NoLSTM,
Bi-LSTM, GRU,
Bi-GRU
Bi-GRUAccuracy: 96.98%,
F1 Score: 98.56%
Raj
et al. [ ]
Wikipedia
Web Toxicity Dataset
NoLSTM,
Bi-LSTM, GRU,
Bi-GRU
Bi-LSTMAccuracy: 96.5%,
F1 Score: 98.69%
Bharti
et al. [ ]
TweetsNoBi-LSTMBi-LSTMAccuracy: 92.60%,
Precision: 96.60%,
F1 Score: 94.20%
Iwendi
et al. [ ]
DISCo
dataset
NoBi-LSTM,
GRU, LSTM, RNN
Bi-LSTMAccuracy:
82.18%
Agarwal
et al. [ ]
Wikipedia
dataset
NoBi-LSTM with
attention layers
Bi-LSTM with
attention layers
Precision: 89%,
Recall: 86%,
F1 Score: 88%
Singh
et al. [ ]
Twitter
dataset
NoLSTM, GRU,
traditional ML
algorithms
GRUF1 Score: 92%
Alotaibi
et al. [ ]
Twitter
comments
YesTransformer
block, Bi-GRU, CNN
Proposed
model
Accuracy: 88%
Bu et
al. [ ]
SNS
comments
YesCNN,
LRCN
Proposed
model
AUC-ROC score:
88.54%,
Accuracy: 87.22%
Murshed
et al. [ ]
Twitter
dataset
YesBi-LSTM, RNN,
DEA-RNN
(proposed model)
DEA-RNNAccuracy: 90.45%,
Precision: 89.52%,
Recall: 88.98%,
F1 Score: 89.25%
Raj
et al. [ ]
Real-time
posts on Twitter
YesCNN + Bi-GRU,
Bi-LSTM + Bi-GRU,
CNN + Bi-LSTM
(proposed model)
Proposed
model
Accuracy: 95%
Beniwal
et al. [ ]
Toxic Comment
Classification
Challenge
YesCNN + Bi-GRUProposed
model
Accuracy: 98.39%,
F1 Score: 79.91%
ReferencesThemeMajor ContributionsFuture Research Directions
 [ , , ]Improvement
of DL models
These studies show improvement of cyberbullying detection by using CNN, LSTM, and BiGRUA-CNN models. These models show enhancement of the classification problem by adjusting activation function, weight regularization, and dropout configuration. ]. ]. ].
 [ , , ]Performance optimization of the modelsStudies applied char-CNN, BiGRU, and transformer models. They largely optimize weights, number of layers, combination of models during cyberbullying detection in social media discourse. ] ] ]
 [ , , ]Improving data capabilityLSTM-CNN and RNN-based models have been applied in text, randomized and wikipedia datasets. The authors proposed several techniques to improve the capacity of the dataset. ]. ]. ] ]. ].
FrameworksStrengthsLimitationsSupported
DL Algorithms
Used in
Cyberbullying
TensorFlow Wide range of
models including
CNN, RNN, GAN,
Transformer, etc.
[ ]
Chats and Tweets [ ], Bangla Text [ ], Offline Content [ ], Social Media text analysis [ ], Comments and Toxicity [ ], Multilingual Tweets and Hate speech [ ], Wikipedia talk page [ ], Post of Social Network platform Gab [ , ]
Keras Wide range of
models including
CNN, RNN, GAN,
Transformer, etc.
[ ]
Twitter [ , , , ], Bully, Sentiment, Emotion and Sarcasm from Twitter and Reddit [ ], Social media content[ , , ], Twitter and Wikipedia [ ], Chats and Tweets [ ], Wikipedia, Twitter, Formspring and YouTube [ ], Social networks’ text and image [ ], online textual harassment [ ]
Torch/
PyTorch
Majority of the
DL Models
including CNN,
RNN, GAN,
Transformer,
etc. [ ]
Social Network platform Gab [ ], Twitter, Wikipedia, Formspring [ ], Harmful meme of COVID-19 [ ], Memes of US politics [ ], Image from online [ ], Cyberbert: BERT for cyberbullying identification [ ], Social media content [ ]
Theano Majority of the
DL Models [ ]
Twitter and Formspring.me [ ], Twitter [ , ], Comments and posts from YouTube, Instagram and Twitter [ ], Twitter and Facebook [ ], Social media image [ ], Online textual harassment [ ]
Caffe Initially
designed
for CNNs [ ]
No Works
Found
Chainer For CNNs,
Dynamic
Computational
Graph [ ]
No Works
Found
Deep-
Learning4j
DL models
that are used
in NLP tasks
[ ]
No Works
Found
DyNet RNNs [ ]No Works
Found
MXNet CNNs, RNNs,
GANs [ ]
Wikipedia
talk pages [ ]
Lasagne Feed-Forward
Networs such as
CNNs, Recurrent
Networks including
LSTM, and any
combination thereof
[ ].
No Works
Found
H O Variety of DL
models including
CNNs
RNNs [ ].
No Works
Found
Google JAX Variety of DL
models including
CNNs and
autoaggressive
models.
No Works
Found
Mind-
Spore
CNNs and RNNs
with a focus on
distributed training
and image
processing [ ].
No Works
Found
DatasetDL ArchitecturesMajor Tasks
Impermium
[ ]
Bi-LSTM, GRU, LSTM, and RNNIntimidation detection on social media
platforms [ ]
Formspring
(a Q&A forum)
Single Linear Neural Network Layer
and Transformer
Cyberbullying detection [ ]
CNN, LSTM, Bi-LSTM, Bi-LSTM
with Attention
Systematically analyzes cyberbullying
detection [ ]
PCNNHandle the difficulty of noise and
distortion in social media postings and
messages in detecting cyberbullying [ ]
WikipediaSingle Linear NN, Transformer [ ],
MLP [ ]
Cyberbullying detection [ , , ]
CNN, LSTM, Bi-LSTM, Bi-LSTM
with Attention [ ]
Systematically analyzes cyberbullying
detection
Twitter [ ]CNN, LSTM, Bi-LSTM, Bi-LSTM
with Attention [ ]
Systematically analyzes cyberbullying
detection [ ]
Char-CNNSCyberbullying detection [ ]
Twitter [ ]PCNNHandling the difficulty of noise and
distortion in social media postings and
messages in detecting cyberbullying
[ ]
Twitter
(combination of 3
datasets) [ , , ]
Bi-GRU, Transformer Block, and 
CNN
Detecting Aggressive Behavior
Twitter
(Indonesian Language)
[ ]
LSTM, Bi-LSTM, and CNNCyberbullying Detection
YouTube [ ]Bi-LSTM with attentionCyberbullying Detection [ ]
Bangla and
Romanized Bangla [ ]
CNN, LSTM, Bi-LSTM, and GRUComparative analysis [ ]
Toxic Comment
Classification challenge
[ ]
LSTM-CNN [ ]Cyberbullying Detection [ ]
The bullying traces
dataset [ ]
SVM activated stacked convolution
LSTM network [ ]
Vine [ , ]ResidualBiLSTM-RCNNCyberbullying Detection [ ]
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Hasan, M.T.; Hossain, M.A.E.; Mukta, M.S.H.; Akter, A.; Ahmed, M.; Islam, S. A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet 2023 , 15 , 179. https://doi.org/10.3390/fi15050179

Hasan MT, Hossain MAE, Mukta MSH, Akter A, Ahmed M, Islam S. A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet . 2023; 15(5):179. https://doi.org/10.3390/fi15050179

Hasan, Md. Tarek, Md. Al Emran Hossain, Md. Saddam Hossain Mukta, Arifa Akter, Mohiuddin Ahmed, and Salekul Islam. 2023. "A Review on Deep-Learning-Based Cyberbullying Detection" Future Internet 15, no. 5: 179. https://doi.org/10.3390/fi15050179

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Advertisement

Advertisement

Understanding Bullying and Cyberbullying Through an Ecological Systems Framework: the Value of Qualitative Interviewing in a Mixed Methods Approach

  • Original Article
  • Open access
  • Published: 10 May 2022
  • Volume 4 , pages 220–229, ( 2022 )

Cite this article

You have full access to this open access article

cyberbullying research paper example

  • Faye Mishna   ORCID: orcid.org/0000-0003-2538-826X 1 ,
  • Arija Birze   ORCID: orcid.org/0000-0002-1988-8383 1 &
  • Andrea Greenblatt   ORCID: orcid.org/0000-0002-6964-8193 1  

5257 Accesses

8 Citations

4 Altmetric

Explore all metrics

Recognized as complex and relational, researchers endorse a systems/social-ecological framework in examining bullying and cyberbullying. According to this framework, bullying and cyberbullying are examined across the nested social contexts in which youth live—encompassing individual features; relationships including family, peers, and educators; and ecological conditions such as digital technology. Qualitative inquiry of bullying and cyberbullying provides a research methodology capable of bringing to the fore salient discourses such as dominant social norms and otherwise invisible nuances such as motivations and dilemmas, which might not be accessed through quantitative studies. Through use of a longitudinal and multi-perspective mixed methods study, the purpose of the current paper is to demonstrate the ways qualitative interviews contextualize quantitative findings and to present novel discussion of how qualitative interviews explain and enrich the quantitative findings. The following thematic areas emerged and are discussed: augmenting quantitative findings through qualitative interviews, contextualizing new or rapidly evolving areas of research, capturing nuances and complexity of perspectives, and providing moments for self-reflection and opportunities for learning.

Similar content being viewed by others

cyberbullying research paper example

A Comparison of Traditional Victims, Cyber Victims, Traditional-Cyber Victims, and Uninvolved Adolescents: A Social-Ecological Framework

A qualitative meta-study of youth voice and co-participatory research practices: informing cyber/bullying research methodologies, a qualitative exploration of college students’ perceptions of cyberbullying, explore related subjects.

  • Artificial Intelligence

Avoid common mistakes on your manuscript.

Introduction

Bullying and cyberbullying are increasingly recognized as complex phenomena that are considered relationship problems (Mishna et al., 2021a ; Pepler et al., 2010 ; Pepler, 2006 ; Spears et al., 2009 ). Appreciating that individuals are embedded in and both shape and are shaped by systems of relationships (Bronfenbrenner & Morris, 2007 ), researchers often endorse an ecological systems framework as paramount and comprehensive in examining bullying and cyberbullying phenomena Footnote 1 (Espelage, 2014 ; Newman et al., 2018 ; Thornberg, 2015 , 2018 ). According to this approach, individuals are embedded in and affected by interconnected and layered systems (Bronfenbrenner, 1979 , 1992 ). Children’s social-emotional development at school is consequently shaped not only by children’s relationships with their teachers and peers, but also by the interconnections between these relationships and the other layers of social ecology, all of which are considered to contribute to social behavioral patterns (O'Moore & Minton, 2005 ). Bullying and cyberbullying are examined across the nested social contexts in which youth live—encompassing individual features, peer relationships, school, family, and ecological climate such as societal norms and conditions as well as online technology (Cross et al., 2015 ; Johnson, 2010 ; Nesi et al., 2018 ). An ecological systems framework is considered an overarching approach that many theories complement and within which they fit (Bauman & Yoon, 2014 ).

The purpose of the current paper is to demonstrate the contributions of qualitative research in understanding the phenomena of bullying and cyberbullying and enriching and complementing the findings of quantitative methodology (Creswell & Creswell, 2018 ). Qualitative inquiry of bullying and cyberbullying provides a research methodology capable of bringing to the fore salient discourses and otherwise invisible nuances that might not be accessed through quantitative studies (Dennehy et al., 2020 ).

There are advantages to utilizing mixed methods in conducting research on various topics including cyberbullying (Creswell & Creswell, 2018 ). When engaging with complex phenomena such as cyberbullying, conceptual and methodological multiplicity offers distinct insights into research questions (McKim, 2017 ; Thornberg, 2011 ). When quantitative and qualitative research are used in combination, it is possible to obtain deeper as well as more comprehensive and accurate understanding of young people’s experiences, which increases the likelihood of informing strategies and responses that can effectively address the needs of children and adolescents (Crivello et al., 2009 ; Darbyshire et al., 2005 ; Fevre et al., 2010 ). The quality of findings may be strengthened when researchers use mixed methods because the data are triangulated (Crivello et al., 2009 ). Data generated through diverse research methods can both complement and contradict each other, which offers an opportunity to better understand the complexities of cyberbullying (Hemming, 2008 ). While quantitative approaches strive for objectivity by examining general concepts, such as cyberbullying, and parceling those concepts into specific, concrete, and understandable behaviors (Fevre et al., 2010 ), qualitative interviews give voice to children and youth, enabling them to express their thoughts and feelings about themselves, their relationships, environments, and the world in which they live (Mishna et al., 2004 ; Chaumba, 2013 ; Dennehy et al., 2020 ; Patton et al., 2017 ).

Through qualitative interviewing, we can step outside the bounds of adult thinking, gaining insights and discovering unanticipated differences in the perceptions of adults and children (Dennehy et al., 2020 ; O’Farrelly, 2021 ). To understand the phenomena of bullying and cyberbullying and inform effective prevention and intervention strategies, it is argued, children’s own views, “are at the heart of these efforts” (O’Farrelly, 2021 , p. 43). Thus, we present findings from the qualitative component of our Canadian federally funded mixed methods longitudinal study on cyberbullying from the perspectives of school-aged youth and their parents and teachers, entitled Motivations for Cyber Bullying: A Longitudinal and Multi-Perspective Inquiry Footnote 2 (Mishna et al., 2016 ).

Background Study Description

The objectives of our longitudinal mixed methods study were to (1) explore youth experiences and perspectives and their parents’ and teachers’ conceptions of cyberbullying; (2) explore how youth and adults view the underlying motivations for cyberbullying; (3) document the prevalence rates of cyberbullying victimization, witnessing, and perpetration; (4) identify risk and protective factors for cyberbullying involvement; and (5) explore social, mental health, and health consequences of cyberbullying among children and youth aged 9 to 18 (grades 4, 7, and 10) over 3 years.

In addressing the objectives, we use an explanatory sequential mixed methods design (Creswell & Creswell, 2018 ). The study comprised a 2-phase data collection approach in which we first collected the quantitative data and then used findings from the first phase to design and plan the qualitative data phase. The quantitative findings informed both our selection of interview participants and the focus of questions we wanted to explore further in the interviews. The overall intent of the qualitative interviews was to enrich and expand upon the quantitative findings and perhaps generate and explore similarities and contradictions (Creswell & Creswell, 2018 ). In the current paper, we briefly review key quantitative findings. We then discuss the qualitative findings and how they provide more depth and insight and demonstrate the complexities of bullying and cyberbullying motivations, behaviors, and attitudes. In so doing, we present novel discussions of how the qualitative interviews augment the quantitative findings.

Participants

Three participant groups were included in the baseline study sample: (1) students in 4th ( n  = 160), 7th ( n  = 243), and 10th ( n  = 267) grades; (2) their teachers ( n  = 103); and (3) their parents ( n  = 246). A stratified random sampling strategy was utilized to select participants. First, a random sample of 19 schools was drawn from one of the largest school boards in North America. Schools were stratified into three categories of need (low, medium, and high) based on an index developed by the school board that ranked schools on external challenges to student achievement (Toronto District School Board, 2014 ). This stratification ensured representation of ethno-cultural and socioeconomic diversity—factors that potentially impact access to Information and Communication Technologies (ICTs), experiences of cyberbullying, and the manifestation of negative outcomes (Lenhart et al., 2015 ; Steeves & Marx, 2014 ). In year 3 of the study, 10 additional schools were recruited for participation to follow those students transitioning from elementary/middle school to middle/secondary school. A total of 29 schools participated in the study. All students in the selected grades at the original participating schools were invited to participate, as were their parents and teachers.

Participating students and their parents provided data in all 3 years of the study, while matching teachers provided data in year 1 only (as student participants’ teachers changed each year). All three participant groups completed quantitative questionnaire packages, and a sub-sample of each group participated in individual interviews. Quantitative data were collected from students and parents in each year of the study, while qualitative data were collected during years 1 and 3, to allow for enough time to elapse for changes in perceptions of cyberbullying to emerge.

Quantitative Measures and Analysis

In year 1, students completed a 45–60-min quantitative questionnaire package in the school setting, while parents completed a questionnaire package by mail. Questionnaires for teachers, which took approximately 45–60 min to complete, were administered in the participating schools. This study utilized several quantitative measures, including standardized measures and measures developed specifically for the study. Student, parent, and teacher surveys obtained information related to experiences with bullying/cyberbullying (Mishna et al., 2012 ; Unpublished Survey), socio-demographics, and Information and Communication Technology (ICT) use. Standardized measures assessing student mental health, health, social, and behavioral issues included Child Behavior Check List (Achenbach, 2001a ), Teacher Report Form (Achenbach, 2001b ), Youth Self Report Form (Achenbach, 2001c ), Self-Perception Profile for Children (Harter, 1985b ), Self-Perception Profile for Adolescents (Harter, 2012 ), Social Support Scale for Children (Harter, 1985a ), and Social Support Behaviors Scale (Vaux et al., 1987 ).

Descriptive analyses were conducted to calculate frequencies for categorical variables and means and standard deviations for continuous variables. We summarized socio-demographic variables among participants in each grade level (4, 7, 10). Items for each outcome scale (e.g., Social Support Scale for Children) were summed to calculate total or subscale scores for each measure.

Findings on Prevalence and Reporting

The quantitative findings in the larger study (Mishna et al., 2015 ) show that rates of cyber witnessing were higher than cyberbullying and victimization at each assessment. In year 1, 24.2 percent reported cyber witnessing, 10.7 percent cyber victimization, and 2.9 percent cyberbullying. In year 2, 21.5 percent reported cyber witnessing, 7.6 percent cyber victimization, and 1.6 percent cyberbullying. In year 3, 25.1 percent reported cyber witnessing, 10.8 percent cyber victimization, and 2.5 percent cyberbullying. Similarly, rates of witnessing traditional bullying were higher than perpetration and victimization at each assessment. In year 1, 53.0% reported witnessing traditional bullying, 23.5% victimization, and 7.8% perpetration. In year 2, 42.6% reported witnessing traditional bullying, 17.3% victimization, and 4.3% perpetration. In year 3, 35.7% reported witnessing traditional bullying, 19.2% victimization, and 5.4% perpetration (Mishna et al., 2015 ). Of note, nearly half of all students (48.3%), who reported cyberbullying involvement in our survey, reported that they had not told an adult about what was happening online (Mishna et al., 2015 ). Moreover, 69.5% of students reported that cyberbullying and physical bullying are equally serious, and 64.5% believed that cyberbullying and “real” life verbal bullying are also equally serious (Mishna et al., 2015 ). These quantitative results serve as a springboard for the following discussion of qualitative findings, demonstrating that qualitative interviews reveal nuanced similarities and differences in the views of adults and youth, elucidating important interconnections among the levels of the ecological system (Mishna et al., 2004 , 2009 ; Dennehy et al., 2020 ).

Qualitative Interview Data Collection and Analysis

Student participants in 4th grade ( n  = 20), 7th grade ( n  = 21), and 10th grade ( n  = 16) in the qualitative sub-sample were purposively selected for interviews from the larger quantitative sample, based on gender, grade, school need level, and whether they reported bullying/cyberbullying victimization, perpetration, or witnessing. After selecting student participants, their teachers ( n  = 30) and parents ( n  = 50) were invited to participate in interviews. Interviews lasted approximately 1 h, ranging in length from 30 to 90 min. All year 1 interviews (with students, parents, and teachers) took place in the school setting and utilized a semi-structured interview guide. Following preliminary analysis, this interview guide was refined for use in the year 3 follow-up phone interviews with the students and parents. Areas explored with students comprised understanding of cyberbullying and how it compares with traditional bullying, experiences of online aggression, and others’ attitudes and responses. Questions were informed by existing literature and the research team’s considerable experience. Parent and teacher interviews included questions on their awareness and understanding of cyberbullying, their child or student’s involvement in cyberbullying, links between cyber and traditional bullying, support, and their responses to cyberbullying.

Using a grounded theory inquiry, data were concurrently analyzed and theorized through constant comparison (Birks & Mills, 2015 ; Corbin & Strauss, 2008 ). Through this iterative process, the team used initial interview data and theoretical categories to inform and refine subsequent interview guides and data collection (Charmaz, 2014 ). The team members individually coded a portion of interviews to establish preliminary analytic focuses and inductively identify preliminary themes. Consistent with a grounded theory approach, no hypotheses guided data analysis and coders sought to bracket their biases through reflexive journaling and team discussions of assumptions (Corbin & Strauss, 2008 ). During team meetings, each interview was collectively coded, building upon, revising, and/or removing codes proposed by the initial coder. Emerging categories were developed and expanded. Axial coding promoted connections within and between categories and subcategories and enabled synthesis and explanation (Birks & Mills, 2015 ; Charmaz, 2014 ; Corbin & Strauss, 2008 ). Numerous preliminary codes were identified based on emerging themes that were generated and discussed. A holistic “middle-order” approach to coding resulted in a condensed number of initial codes (Saldaña, 2015 ). Axial coding was then used to identify connections within and between themes and subthemes (Birks & Mills, 2015 ; Charmaz, 2006 , 2014 ; Corbin & Strauss, 2008 ). Through this iterative process of open, holistic, and focused coding, key themes emerged related to the understanding of traditional and cyberbullying according to the perspectives of the students, parents, and teachers. Measures were employed to ensure trustworthiness and authenticity. Prolonged engagement over the 3 years of the study ensured thick descriptions of the youth and adult narratives (Lietz & Zayas, 2010 ). Rigor was established through documentation for auditing purposes (Padgett, 2008 ). Trustworthiness and transferability were further ensured through reflexive journaling, bracketing, and dense descriptions (Corbin & Strauss, 2008 ).

While we use examples from our published manuscripts derived from our study entitled, “Motivations of Cyberbullying,” in the current manuscript, we identify new thematic areas and demonstrate how our qualitative interviews complement our quantitative findings. In analyzing findings across the study publications and datasets, we have not previously drawn the conclusions. The unique contribution of the current manuscript is the use of findings of previous publications to generate broader conclusions about the benefits of a mixed-methods approach (qualitative interviews and quantitative survey data) that makes visible the connections across ecological systems levels.

In discussing how qualitative research contributes to understanding bullying and cyberbullying and complements quantitative findings, the following new thematic areas are discussed: augmenting quantitative findings through qualitative interviews, contextualizing new or rapidly evolving areas of research, capturing nuances and complexity of perspectives, and providing moments for self-reflection and opportunities for learning.

Augmenting Quantitative Findings Through Qualitative Interviews

By examining process, context, and meaning for participants, qualitative methodology can augment quantitative findings. Quantitative methodology establishes outcomes and causal relationships and puts forth generalization and predictions (Yilmaz, 2013 ). Our background study which was a longitudinal multi-informant mixed methods study (Tashakkori et al., 1998 ) used grounded theory (Strauss & Corbin, 1998 ) and a longitudinal quantitative design to aid understanding of nuances related to cyberbullying (Mishna et al., 2009 ). In creating opportunities for the voices of young people to be heard (Carroll & Twomey, 2020 ; Gilgun & Abrams, 2002 ), qualitative methodology is especially useful for phenomena that are largely unstudied and/or rapidly evolving, such as cyberbullying, by explicating process and a holistic understanding and directions for future research (Mishna & Van Wert, 2013 ; Gilgun & Abrams, 2002 ).

In our paper, “Benchmarks and bellwethers in cyberbullying: The relational process of telling” Footnote 3 (Mishna et al., 2020 ), the qualitative analysis revealed relational processes among students that occurred when they considered whether to tell adults about their bullying and cyberbullying experiences. As noted above, almost half of the students who reported cyberbullying involvement relayed that they had not told an adult. Qualitative findings, however, exposed complex interactions that informed their decision-making processes. Reticent about speaking with adults, students turned to friends. It emerged that in addition to sharing, telling friends often served as a bellwether to gauge whether to proceed and report the situation to an adult. Often minimizing the severity of their ordeal, many students had decided against informing adults, frequently mentioning their concern about making a “big deal.” Participant interviews further revealed that media reports of high-profile cases involving cyberbullying can serve as benchmarks through which to assess the severity of their own personal experiences. The qualitative findings in our study helped to contextualize the quantitative data by unpacking and making visible the reasoning and contributing factors, thus increasing understanding of what informs youth’s decisions regarding whether and who to tell about cyberbullying involvement. By augmenting the quantitative data detailing the proportion of youth who do not tell adults, particulars attained through qualitative interview data help to inform and direct prevention and intervention strategies that are concrete and actionable for addressing the more challenging aspects of cyberbullying involvement and disclosure. In offering insights on the relational dynamics among peers and between youth and adults with respect to cyberbullying, the qualitative analysis gave voice to these interconnected layers of the youths’ ecological environment.

Contextualizing New or Rapidly Evolving Areas of Research

While cyberbullying is no longer considered a new phenomenon, the rapid development of technology is continually altering the cyber landscape, creating a need for perpetual knowledge generation (Odgers & Jensen, 2020 ; Rosa et al., 2019 ) and for evolving definitions, measurements, and responses (Spears et al., 2009 ). Moreover, rapid and ongoing technological advances create unique challenges for practitioners, policy makers, and researchers, in remaining current and responding to cyberbullying (George & Odgers, 2015 ; Jäger et al., 2010 ). With youth at the forefront of technological advances in many ways, qualitative methodology is well suited to elicit the experiences and perspectives of young people in promoting in-depth understanding of youth cultures, dynamics, and processes (Thornberg & Knutsen, 2011 ).

The data collection for our background study occurred between 2012 and 2014, during the early stages of attention to and research on sexting (sending and receiving sexually explicit images, videos, and text among youth). In the quantitative questionnaires, we included one question related to sexting for students in grades 7 and 10 and their parents and teachers. Our quantitative survey found that 15.6% of students in grades 7 and 10 had seen nude or sexual photos of friends, family, boyfriend, girlfriend, or other romantic partner online or over a cell phone. Furthermore, 27.8% of teachers had witnessed or were aware of their students viewing sexually explicit images, video, or text on cell phones at school. The data indicated that digital sending and receiving of sexually explicit images, video, or text was a new phenomenon among youth participants in grades 7 and 10 in a rapidly changing digital environment.

We did not explicitly inquire about sexting in the interviews with students, parents, and teachers. Rather, we asked participants about the students’ negative experiences with cyber technology. During analysis of the interview data, however, sexting emerged as a new and pertinent phenomenon among youth, which generated knowledge about rapidly evolving cyber dynamics that warranted further attention and inspired a paper entitled, “Gendered and sexualized bullying and cyberbullying: Spotlighting girls and making boys invisible” (Mishna et al., 2021b ). The qualitative interview data in this instance confirmed our quantitative findings on sexting among youth and allowed us to delve into the complex and nuanced ways participants articulated sexting behaviors along gender lines that both reinforced and were reinforced by gendered sociocultural norms and pressures. In student accounts, boys’ presence and participation in cyberbullying were frequently invisible, such as the non-consensual sharing of sexual images. Blamed for their poor choices, girls were spotlighted and their behavior problematized through negative characterizations. The participants’ focus on girls as responsible for the gendered cyberbullying and non-consensual sharing of images corresponds with how youth are typically educated about digital technologies through an “online safety model” with the focus on youth protecting themselves and avoiding “risky” activities (Johnson, 2015 ). As such, our findings provided context for this rapidly evolving environment that then allowed us to draw links between individual cyberbullying behaviors, understanding and articulation of these behaviors, and the broader influence of patriarchal structures (Mishna et al., 2021b ). The qualitative findings underscored the need to consider key factors that go beyond individual characteristics and behaviors and to develop education and prevention and intervention strategies that address sociocultural norms and values. The qualitative findings stimulated new research endeavors and collaborations with community organizations and academics.

Capturing Nuances and Complexity of Perspectives

Bullying and cyberbullying are exceedingly complex and must be studied within the contexts of the involved youth as well as within the larger social context of youth (Cross et al., 2015 ; Dennehy et al., 2020 ; Johnson & Puplampu, 2008 ; Sainju, 2020 ; Thornberg, 2011 ). An ecological systems framework is appropriate as it provides insight into the interconnected relationships among varying aspects and social layers of an individual’s world (Bronfenbrenner, 1979 ). While quantitative research considers and articulates context, qualitative interviews provide an occasion to engage with the richness of students’ perspectives, thoughts, and feelings about themselves and their social worlds (Mishna et al., 2004 ) and allow for a deeper understanding of youth culture and social processes from the vantage point of young people (Chaumba, 2013 ; Dennehy et al., 2020 ; Spears et al., 2009 ; Thornberg & Knutsen, 2011 ). Although qualitative studies are generally bound by a particular timeframe, participants bring their life histories and cumulative experiences to the research engagement (Phoenix et al., 2003 ), which can generate a fulsome and holistic understanding of cyberbullying, taking into consideration individual, family, peer, school, cyber, and sociocultural conditions over time.

Qualitative interview data allow for an interpretive approach that draws upon patterns of understanding, similarity, and contradiction, thereby teasing out underlying assumptions that shape how people define and assess experiences and phenomena such as bullying and cyberbullying (Mishna et al., 2020 , 2021a ). In our paper entitled “Looking Beyond Assumptions to Understand Relationship Dynamics in Bullying” Footnote 4 (Mishna et al., 2021a ), analysis of the qualitative interview data exposed persistent and pervasive assumptions about bullying linked to sociocultural norms and understanding of gender. These assumptions shaped participants’ understanding and conclusions of bullying and cyberbullying experiences, behavior, and motivations. Focusing on the visible hurt and injuries associated with physical bullying, participants tended to make comments such as “you’ll heal in a few days,” whereas they noted that with verbal bullying, the mental anguish “might stay for a long term.” This viewpoint that physical bullying was not a relationship problem appeared to be linked to gender stereotypes and social norms regarding the “natural” behavior of girls and boys. These gendered assumptions led participants to suggest that addressing bullying among girls was “complicated” and ongoing, whereas addressing physical bullying among boys was “simpler” and faster, a finding similar to that of Eriksen and Lyng ( 2018 ) who described participants’ descriptions of bullying among boys as “undramatic.” These assumptions appeared to preclude participants from discussing physical bullying among boys in a manner that acknowledged the physical bullying involvement as entrenched in relationship dynamics.

Qualitative interviewing provides an opportunity for participants to express their views and ideas when discussing the topic of interest which can elicit novel conclusions and nuances. As an example, at times, youth who claimed not to have involvement with cyberbullying may go on to describe situations that actually seemed to fit the definition of cyberbullying. In our Spotlighting Girls paper, many participant reports aligned with stereotypes regarding differences in how boys and girls bully others. These stereotypes were shared, however, even when they contradicted participants’ own experiences. For instance, similar to other research findings (Eriksen & Lyng, 2018 ), one participant described a boy as using “guilt trips” as a bullying tactic, yet described boys as only bullying physically. Consequently, relational aggression among boys often goes unnoticed and remains invisible. Similarly, the same behavior displayed by both girls and boys was discounted in boys and highlighted in girls. Boys’ behaviors were often not considered to be bullying because they were positioned as within the bounds of masculine gender norms. For example, one girl reported that “mostly girls, not boys,” bully “because boys would just go over and do some physical things... [Girls would] post embarrassing stuff about the person and do that kind of stuff” (p. 410). It is possible therefore that such actions by boys were not identified as bullying and thus underreported in the quantitative surveys while captured in the interviews. Discrepancies emerged in how cyberbullying had been reported in quantitative measures and how it was described in the interviews. This indicates that qualitative interviews can complement quantitative findings by revealing the complexities and ramifications of social experiences which are not reported in quantitative surveys.

The critical role of witnessing in bullying and cyberbullying is well documented (Salmivalli, 2010 , 2014 ; Spadafora et al., 2020 ; Volk et al., 2014 ). Social experiences related to witnessing are also complex, and bystander decision-making and responses impact both the process and outcomes of bullying incidents (Salmivalli et al., 2011 ). Qualitative research can offer youth the opportunity to explore and explain the motivations and factors they consider in determining whether to intervene, specifically the social costs and benefits of intervening (Spadafora et al., 2020 ). Our qualitative interviews similarly added youth voices concerning the dilemmas they faced in considering whether and how to respond based on emotional and contextual factors (Mishna et al., 2021b ), thus providing nuanced perspectives that serve to augment the quantitative findings related to bystander responses.

Providing Moments for Self-reflection and Opportunities for Learning

Qualitative methodologies are recognized as providing participants opportunities to self-reflect in the context of being listened to empathically (Birch & Miller, 2000 ; Wolgemuth et al., 2015 ). According to a systematic review of quantitative, qualitative, and mixed-methods studies conducted with children and adolescents, participation was mainly considered to be beneficial (Crane & Broome, 2017 ). Negative responses to participating in the research included feeling anxious and upset (Crane & Broome, 2017 ). Research indicates that despite describing negative effects of participating, children and youth reported that overall it was more positive to participate in the research (Crane & Broome, 2017 ) or described the emotional pain they experienced as beneficial in various ways, for example, as “emotionally cleansing” (Wolgemuth et al., 2015 , p. 366). The qualitative research process offers participants the opportunity to come to new understandings and can reveal evolving thoughts within participant narratives (Birch & Miller, 2000 ; Wolgemuth et al., 2015 ). Qualitative processes are iterative and involve probing questions that can prompt dynamic reflection by participants (Wolgemuth et al., 2015 ). Birch and Miller ( 2000 ) explain that they “use the term therapeutic to represent a process by which an individual reflects on, and comes to understand previous experiences in different—sometimes more positive—ways that promote a changed sense of self” (p. 190).

Recognizing the potential risks in research with children and youth (Mishna et al., 2004 ; Crane & Broome, 2017 ), we informed the students in our study of the possible risks should they decide to participate, such as the possibility that they would become upset as we were asking them about hurtful matters, and the limits to confidentiality. Anticipating that some of the questions could lead to a participant becoming distressed or disclosing potentially sensitive or upsetting information, we put in place a protocol (approved by the university and school board research ethics boards) to identify and offer support for students in distress (Mishna et al., 2016 ).

Corresponding with previous research, the reflexivity of sharing their narratives and views seemed to contribute to some participants coming to a different understanding of their experiences. Such reflection was evident in our interviews with students and their parents and teachers. When asked whether he had witnessed cyberbullying, for example, a boy reflected that only in being asked about cyberbullying in the interview did he recognize the behavior as cyberbullying: “When I think about it now, I actually did a few times. I didn’t feel that it’s cyber bullying, I wasn’t thinking that it’s a huge deal. It’s basically a few arguments between people on Facebook, like writing things about each other in public, not in private, chats.”

In another example, a parent reconsidered her views during the interview. This parent first commented that girls and women are “more vindictive” than boys and men, who, she explained, have “your spat, you get over it, and you move on.” After reflecting on her assumptions, she wondered how much of this widely held view of the behavior “is just media driven because I guess the victims that we see on the news, at least in Canada, have been girls, right?… but that doesn’t say that boys aren’t also being bullied.” Similarly, a girl contemplated her assumptions after first casting boys in a favorable light in contrast to girls. In commenting that girls bully each other because of appearance, she praised boys, “because usually they don’t tend to worry about those things...They’re proud of themselves, and they don’t pick on other people. They’re good with what they have.” After pondering these stated differences between boys and girls, this girl surmised, “I think it’s from when we were little because those Barbie dolls are super skinny. We wanted to have blonde hair, blue eyes, and be like Barbie. I think it’s just how maybe we were raised.” Another girl, who asserted that while cyberbullying occurred with equal frequency among boys and girls, added that it was not “a big thing” for boys, in contrast to girls who, “would show it off more, be like oh yah, blah, blah, blah.” Rather than concluding that this difference indicated that cyberbullying was not a big deal for boys, however, this girl attributed the difference between boys and girls to dominant masculinity norms. She asserted that “guys kind of hide it in more” and explained that “they don’t want to show that they’re weak because guys tend to be, they think that they’re very strong, kind of thing.” The evolving perspectives throughout this and the previous exchanges demonstrate the process of deepened understanding that can occur because of qualitative interviewing.

Such new understanding can inspire a desire to act and make change through community engagement. A girl explained that the research was the first time she had spoken with anyone about cyberbullying. This girl’s appraisal of her participation is consistent with findings in which participants may be motivated to take part in research for the opportunity to effect and advocate for change and help others (Cutcliffe & Ramcharan, 2002 ; Wolgemuth et al., 2015 ). She remarked that participating had been a helpful process which led her to,

think of different ways that I could help someone else if I see it happening… Just talking about it makes you think about what could cause it, what could make someone bully someone else. It makes you realize how it could make someone feel. Also, talking about how there isn’t really a support system at school. It makes me want to go and talk to someone to organize it, because it does happen a lot and I know it affects a lot of people

The inclusion of qualitative interviews in mixed methods research brings forth new information about content, process, and meaning that is otherwise not visible. By engaging youth voices as well as adult perspectives through both quantitative measures and qualitative interviews in the mixed methods study discussed in this manuscript, entitled Motivations for Cyberbullying, understanding of bullying and cyberbullying was advanced, thus enriching the quantitative methodology. The findings of the interviews extended knowledge related to bullying and cyberbullying in the following ways, which can inform “bottom-up research and intervention efforts” (Dennehy et al., 2020 , p. 10): augmenting quantitative findings, contextualizing new or rapidly evolving areas of research, capturing nuances and complexity of perspectives, and providing moments for self-reflection and opportunities for learning.

Qualitative research constitutes a significant venue through which to amplify the voices of children and youth (Dennehy et al., 2020 ) and ensures that children and youth’s experiences of the world are represented in understanding social phenomena (Mishna et al., 2004 ; Carroll & Twomey, 2020 ; Chaumba, 2013 ; Dennehy et al., 2020 ; Patton et al., 2017 ). According to Dennehy and colleagues ( 2020 ), engaging youth as co-researchers in cyberbullying research may enhance efforts to ethically and earnestly amplify youth voices. A synthesis by Elsaesser et al. ( 2017 ) supports the view that focusing on collaboratively working with youth to understand and safely navigate the cyber world through education and empowerment is more effective than interventions aimed at restricting ICT use without involving youth. Through quantitative measures and qualitative interviews, our mixed methods study examined participant perspectives regarding bullying and cyberbullying on the various ecological systems levels across the students’ lives. The use of mixed methods facilitated a dialogue between the participant responses to both methodologies, thus highlighting the salience of the overlapping influence and interactions among the systems levels. Such complex and nuanced understanding is necessary to inform meaningful prevention and intervention strategies to address bullying and cyberbullying.

According to the United Nations Convention on the Rights of the Child (Assembly UG, 1989 ), children and youth have the right to discuss their views and experiences. The Convention states that all children have the right to protections, provisions, participation, and non-discrimination (Assembly UG, 1989 ). Participation entails the right for children to express themselves and have a voice in situations that have to do with and affect them. The importance of listening to children’s voices underscores the limits of adult proxies in representing children’s emotional and social worlds (O’Farrelly, 2021 ). Bullying and cyberbullying fundamentally violate these protections, silence children’s voices, and compromise their healthy development (Greene, 2006 ). Our mixed methods study through quantitative measures and qualitative interviews facilitated a dialogue between the participant responses in both methodologies. This interaction of data types maximizes the voices of and collaboration with participants as well as knowledge generation.

Data Availability

Not applicable.

Code Availability

Different terms are used to describe the same approach (e.g., social-ecological framework, ecological systems framework, ecological theory, ecological perspectives). For the purposes of this paper, the term ecological systems framework is used.

All additional references to this research study will be shortened to “Motivations for Cyberbullying.”

All additional references to this paper will be shortened to “Benchmarks and Bellwethers paper.”

All additional references to the paper will be shortened to “Relationship Dynamics paper.”

Achenbach, T. (2001a). Child behavior checklist . ASEBA, University of Vermont. https://store.aseba.org/CHILD-BEHAVIOR-CHECKLIST_6-18/productinfo/201/

Achenbach, T. (2001b). Teacher report form . ASEBA, University of Vermont. https://store.aseba.org/TEACHERS-REPORT-FORM_6-18/productinfo/301/

Achenbach, T. (2001c). Youth self report form . ASEBA, University of Vermont. https://store.aseba.org/YOUTH-SELF-REPORT_11-18/productinfo/501/

Assembly, U. G. (1989). Convention on the Rights of the Child. (1989). United Nations, Treaty Series, 1577 (3), pp. 1–23.

Bauman, S. A., & Yoon, J. (2014). This issue: Theories of bullying and cyberbullying. Theory into Practice, 53 (4), 253–256.  https://doi.org/10.1080/00405841.2014.947215

Article   Google Scholar  

Birch, M., & Miller, T. (2000). Inviting intimacy: The interview as therapeutic opportunity. International Journal of Social Research Methodology, 3 (3), 189–202.

Birks, M., & Mills, J. (2015). Grounded theory: A practical guide . Sage.

Bronfenbrenner, U. (1979). The ecology of human development: Experiments by nature and design.

Bronfenbrenner, U. (1992). Contexts of child rearing: Problems and prospects. Child and Youth Care Administrator, 5 (1), 59–64.

Google Scholar  

Bronfenbrenner, U., & Morris, P. A. (2007). The bioecological model of human development. In R. M. Lerner (Ed.), Handbook of child psychology (6 ed., Vol. 1, pp. 793–828). Wiley.

Carroll, C., & Twomey, M. (2020). Voices of children with neurodevelopmental disorders in qualitative research: A scoping review. Journal of Developmental and Physical Disabilities , 1–16.

Charmaz, K. (2006). Constructing grounded theory: A practical guide through qualitative research . Sage Publications Ltd.

Charmaz, K. (2014). Constructing grounded theory (2nd ed.). Sage.

Chaumba, J. (2013). The use and value of mixed methods research in social work. Advances in Social Work, 14 (2), 307–333.

Corbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and procedures for developing grounded theory . Sage Publications Inc.

Crane, S., & Broome, M. E. (2017). Understanding ethical issues of research participation from the perspective of participating children and adolescents: A systematic review. Worldviews on Evidence-Based Nursing, 14 (3), 200–209.

Article   PubMed   PubMed Central   Google Scholar  

Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5 ed.). Sage Publications.

Crivello, G., Camfield, L., & Woodhead, M. (2009). How can children tell us about their wellbeing? Exploring the potential of participatory research approaches within young lives. Social Indicators Research, 90 (1), 51–72.

Cross, D., Barnes, A., Papageorgiou, A., Hadwen, K., Hearn, L., & Lester, L. (2015). A social–ecological framework for understanding and reducing cyberbullying behaviours. Aggression and Violent Behavior, 23 , 109–117.

Cutcliffe, J. R., & Ramcharan, P. (2002). Leveling the playing field? Exploring the merits of the ethics-as-process approach for judging qualitative research proposals. Qualitative Health Research, 12 (7), 1000–1010.

Article   PubMed   Google Scholar  

Darbyshire, P., MacDougall, C., & Schiller, W. (2005). Multiple methods in qualitative research with children: More insight or just more? Qualitative Research, 5 (4), 417–436.

Dennehy, R., Meaney, S., Walsh, K. A., Sinnott, C., Cronin, M., & Arensman, E. (2020). Young people’s conceptualizations of the nature of cyberbullying: A systematic review and synthesis of qualitative research. Aggression and Violent Behavior, 51 , 101379.

Elsaesser, C., Russell, B., Ohannessian, C. M., & Patton, D. (2017). Parentng in a digital age: A review of parents’ role in preventing adolescent cyberbullying. Aggression and Violent Behavior, 35 , 62–72.

Eriksen, I. M., & Lyng, S. T. (2018). Relational aggression among boys: Blind spots and hidden dramas. Gender and Education, 30 (3), 396–409.

Espelage, D. L. (2014). Ecological theory: Preventing youth bullying, aggression, and victimization. Theory into Practice, 53 (4), 257–264.

Fevre, R., Robinson, A., Jones, T., & Lewis, D. (2010). Researching workplace bullying: The benefits of taking an integrated approach. International Journal of Social Research Methodology, 13 (1), 71–85.

George, M. J., & Odgers, C. L. (2015). Seven fears and the science of how mobile technologies may be influencing adolescents in the digital age. Perspectives on Psychological Science, 10 (6), 832–851.

Gilgun, J. F., & Abrams, L. S. (2002). The nature and usefulness of qualitative social work research: Some thoughts and an invitation to dialogue. Qualitative Social Work, 1 (1), 39–55.

Greene, M. (2006). Bullying in Schools: A Plea for a Measure of Human Rights. Journal of Social Issues, 62 (1), 63–79. https://doi.org/10.1111/j.1540-4560.2006.00439.x

Harter, S. (1985a). Manual for the social support scale for children . University of Denver.

Harter, S. (1985b). The self-perception profile for children (manual) . University of Denver.

Harter, S. (2012). Self-perception profile for adolescents: Manual and questionnaires . Univeristy of Denver, Department of Psychology.

Hemming, P. J. (2008). Mixing qualitative research methods in children’s geographies. Area, 40 (2), 152–162.

Jäger, T., Amado, J., Matos, A., & Pessoa, T. (2010). Analysis of experts’ and trainers’ views on cyberbullying. Journal of Psychologists and Counsellors in Schools, 20 (2), 169–181.

Johnson, G. (2010). Internet use and child development: The techno-microsystem. Australian Journal of Educational and Developmental Psychology (AJEDP), 10 , 32–43.

Johnson, G., & Puplampu, K. (2008). A conceptual framework for understanding the effect of the Internet on child development: The ecological techno-subsystem. Canadian Journal of Learning and Technology, 34 , 19–28.

Johnson, M. (2015). Digital literacy and digital citizenship: Approaches to girls’ online experiences. In J. Bailey & V. Steeves (Eds.), eGirls, eCitizens (pp. 339–360). University of Ottawa Press.

Lenhart, A., Duggan, M., Perrin, A., Stepler, R., Rainie, H., & Parker, K. (2015). Teens, social media & technology overview 2015 . Pew Research Center [Internet & American Life Project].

Lietz, C. A., & Zayas, L. E. (2010). Evaluating qualitative research for social work practitioners. Advances in Social Work, 11 (2), 188–202.

McKim, C. A. (2017). The value of mixed methods research: A mixed methods study. Journal of Mixed Methods Research, 11 (2), 202–222.

Mishna, F., Antle, B. J., & Regehr, C. (2004). Tapping the perspectives of children: Emerging ethical issues in qualitative research. Qualitative Social Work: Research and Practice, 3 (4), 449–468.

Mishna, F., Craig, W., Pepler, D., & Daciuk, J. (2012). The Bullying and Cyberbullying: Perpetrators . Victims and Witnesses Survey: Unpublished survey.

Mishna, F., McInroy, L., Lacombe-Duncan, A., & Daciuk, J. (2015). Motivations for cyberbullying study: A longitudinal and multi-perspective inquiry . Toronto, ON: The Authors.

Mishna, F., McInroy, L. B., Lacombe-Duncan, A., Bhole, P., VanWert, M., Schwan, K., et al. (2016). Prevalence, motivations, and social, mental health and health consequences of cyberbullying among school-aged children and youth: Protocol of a longitudinal and multi-perspective mixed method study. JMIR Research Protocols, 5 (2), e83.

Mishna, F., *Saini, M., & *Solomon, S. (2009). Ongoing and online: Children and youth’s perceptions of cyber bullying. Children and Youth Services Review, 31 (12), 1222–1228.

Mishna, F., Schwan, A., *Birze, A., Van Wert, M., McInroy, L., *Lacombe-Duncan, A., Attar-Schwartz, S., & Daciuk, J. (2020). Gendered and sexualized bullying and cyber bullying: Spotlighting girls and making boys invisible. Youth & Society, 52 (3), 403–426. https://doi.org/10.1177/0044118X18757150

Mishna, F., & Van Wert, M. (2013). Qualitative studies. In S. Bauman, D. Cross, & J. Walker (Eds.), Principles of cyberbullying research: Definitions, measures, and methodology (pp. 238–257). New York & London: Routledge.

Mishna, F., Birze, A., Greenblatt, A., & Pepler, D. (2021a). Looking beyond assumptions to understand relationship dynamics in bullying. Frontiers in Psychology, 12, 1–11. https://doi.org/10.3389/fpsyg.2021.661724

Mishna, F., Birze, A., Greenblatt, A., & Khoury-Kassabri, M. (2021b). Benchmarks and bellwethers in cyberbullying: The relational process of telling. International Journal of Bullying Prevention, 3 (4), 241–252. https://doi.org/10.1007/s42380-020-00082-3

Nesi, J., Choukas-Bradley, S., & Prinstein, M. J. (2018). Transformation of adolescent peer relations in the social media context: Part 1—A theoretical framework and application to dyadic peer relationships. Clinical Child and Family Psychology Review, 21 (3), 267–294.

Newman, P. A., Fantus, S., Woodford, M. R., & Rwigema, M.-J. (2018). “Pray that god will change you”: The religious social ecology of bias-based bullying targeting sexual and gender minority youth—A qualitative study of service providers and educators. Journal of Adolescent Research, 33 (5), 523–548.

O’Moore, A. M., & Minton, S. J. (2005). Evaluation of the effectiveness of an anti-bullying programme in primary schools. Aggressive Behavior: Official Journal of the International Society for Research on Aggression, 31 (6), 609–622.

O’Farrelly, C. (2021). Bringing young children’s voices into programme development, randomized controlled trials and other unlikely places. Children & Society, 35 (1), 34–47.

Odgers, C. L., & Jensen, M. R. (2020). Annual research review: Adolescent mental health in the digital age: Facts, fears, and future directions. Journal of Child Psychology and Psychiatry, 61 (3), 336–348.

Padgett, D. (2008). Qualitative Methods in Social Work Research . Sage.

Patton, D. U., Hong, J. S., Patel, S., & Kral, M. J. (2017). A systematic review of research strategies used in qualitative studies on school bullying and victimization. Trauma, Violence, & Abuse, 18 (1), 3–16.

Pepler, D., Craig, W., & O'Connell, P. (2010). Peer processes in bullying: Informing prevention and intervention strategies.

Pepler, D. J. (2006). Bullying interventions: A binocular perspective. Journal of the Canadian Academy of Child and Adolescent Psychiatry, 15 (1), 16.

PubMed   PubMed Central   Google Scholar  

Phoenix, A., Frosh, S., & Pattman, R. (2003). Producing contradictory masculine subject positions: Narratives of threat, homophobia and bullying in 11–14 year old boys. Journal of Social Issues, 59 (1), 179–195.

Rosa, H., Pereira, N., Ribeiro, R., Ferreira, P. C., Carvalho, J. P., Oliveira, S., Coheur, L., Paulino, P., Simão, A. V., & Trancoso, I. (2019). Automatic cyberbullying detection: A systematic review. Computers in Human Behavior, 93 , 333–345.

Sainju, K. D. (2020). Beyond the schoolyard: A multilevel examination of individual, school and school district variables associated with traditional and cyber peer aggression. Child & Youth Care Forum.

Saldaña, J. (2015). The coding manual for qualitative researchers . Sage.

Salmivalli, C. (2010). Bullying and the peer group: A review. Aggression and Violent Behavior, 15 (2), 112–120.

Salmivalli, C. (2014). Participant roles in bullying: How can peer bystanders be utilized in interventions? Theory into Practice, 53 (4), 286–292.

Salmivalli, C., Voeten, M., & Poskiparta, E. (2011). Bystanders matter: Associations between reinforcing, defending, and the frequency of bullying behavior in classrooms. Journal of Clinical Child & Adolescent Psychology, 40 (5), 668–676.

Spadafora, N., Marini, Z. A., & Volk, A. A. (2020). Should I defend or should I go? An adaptive, qualitative examination of the personal costs and benefits associated with bullying intervention. Canadian Journal of School Psychology, 35 (1), 23–40.

Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes and screens: Insights into the human dimension of covert and cyberbullying. Zeitschrift Für Psychologie/journal of Psychology, 217 (4), 189–196.

Steeves, V., & Marx, G. T. (2014). Safe schools initiatives and the shifting climate of trust. Responding to school violence: Confronting the Columbine effect , 105–124.

Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory (2nd ed.). Sage Publications Inc.

Tashakkori, A., Teddlie, C., & Teddlie, C. B. (1998). Mixed methodology: Combining qualitative and quantitative approaches (Vol. 46). Sage.

Thornberg, R. (2011). ‘She’s weird!’—The social construction of bullying in school: A review of qualitative research. Children & Society, 25 (4), 258–267.

Thornberg, R. (2015). The social dynamics of school bullying: The necessary dialogue between the blind men around the elephant and the possible meeting point at the social-ecological square. Confero: Essays on Education, Philosophy and Politics, 3 (2), 161–203.

Thornberg, R. (2018). School bullying and fitting into the peer landscape: A grounded theory field study. British Journal of Sociology of Education, 39 (1), 144–158.

Thornberg, R., & Knutsen, S. (2011). Teenagers’ explanations of bullying. Child & Youth Care Forum,

Toronto District School Board. (2014). The 2014 Learning Opportunities Index: Questions and answers .

Vaux, A., Riedel, S., & Stewart, D. (1987). Modes of social support: The social support behaviors (SS-B) scale. American Journal of Community Psychology, 15 (2), 209–232.

Volk, A. A., Dane, A. V., & Marini, Z. A. (2014). What is bullying? A Theoretical Redefinition. Developmental Review, 34 (4), 327–343.

Wolgemuth, J. R., Erdil-Moody, Z., Opsal, T., Cross, J. E., Kaanta, T., Dickmann, E. M., & Colomer, S. (2015). Participants’ experiences of the qualitative interview: Considering the importance of research paradigms. Qualitative Research, 15 (3), 351–372.

Yilmaz, K. (2013). Comparison of quantitative and qualitative research traditions: Epistemological, theoretical, and methodological differences. European Journal of Education, 48 (2), 311–325.

Download references

Acknowledgements

We would like to acknowledge first and foremost the Toronto District School Board for their utmost commitment to participating in the study, as well as each school for their dedication to both data collection and ensuring that the mental health needs of students that were identified through the study were addressed. We would like to thank the students, parents, and teachers for sharing their experiences with us. We would like to thank the research assistants, without whom we could not have completed this study.

This research was supported by a grant from the Social Sciences and Humanities Research Council of Canada: Grant Account Number: 410–2011-1001.

Author information

Authors and affiliations.

Factor-Inwentash Faculty of Social Work, University of Toronto, 246 Bloor Street West, Toronto, ON, M5S 1V4, Canada

Faye Mishna, Arija Birze & Andrea Greenblatt

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Faye Mishna .

Ethics declarations

Conflict of interest.

The authors declare no competing interests.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Mishna, F., Birze, A. & Greenblatt, A. Understanding Bullying and Cyberbullying Through an Ecological Systems Framework: the Value of Qualitative Interviewing in a Mixed Methods Approach. Int Journal of Bullying Prevention 4 , 220–229 (2022). https://doi.org/10.1007/s42380-022-00126-w

Download citation

Accepted : 25 April 2022

Published : 10 May 2022

Issue Date : September 2022

DOI : https://doi.org/10.1007/s42380-022-00126-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Qualitative research benefits
  • Mixed methods research
  • Bullying and cyberbullying
  • Voices of children and youth
  • Find a journal
  • Publish with us
  • Track your research

SYSTEMATIC REVIEW article

Cyberbullying among adolescents and children: a comprehensive review of the global situation, risk factors, and preventive measures.

\nChengyan Zhu&#x;

  • 1 School of Political Science and Public Administration, Wuhan University, Wuhan, China
  • 2 School of Medicine and Health Management, Tongji Medical College, Huazhong University of Science and Technology, Wuhan, China
  • 3 College of Engineering, Design and Physical Sciences, Brunel University London, Uxbridge, United Kingdom

Background: Cyberbullying is well-recognized as a severe public health issue which affects both adolescents and children. Most extant studies have focused on national and regional effects of cyberbullying, with few examining the global perspective of cyberbullying. This systematic review comprehensively examines the global situation, risk factors, and preventive measures taken worldwide to fight cyberbullying among adolescents and children.

Methods: A systematic review of available literature was completed following PRISMA guidelines using the search themes “cyberbullying” and “adolescent or children”; the time frame was from January 1st, 2015 to December 31st, 2019. Eight academic databases pertaining to public health, and communication and psychology were consulted, namely: Web of Science, Science Direct, PubMed, Google Scholar, ProQuest, Communication & Mass Media Complete, CINAHL, and PsycArticles. Additional records identified through other sources included the references of reviews and two websites, Cyberbullying Research Center and United Nations Children's Fund. A total of 63 studies out of 2070 were included in our final review focusing on cyberbullying prevalence and risk factors.

Results: The prevalence rates of cyberbullying preparation ranged from 6.0 to 46.3%, while the rates of cyberbullying victimization ranged from 13.99 to 57.5%, based on 63 references. Verbal violence was the most common type of cyberbullying. Fourteen risk factors and three protective factors were revealed in this study. At the personal level, variables associated with cyberbullying including age, gender, online behavior, race, health condition, past experience of victimization, and impulsiveness were reviewed as risk factors. Likewise, at the situational level, parent-child relationship, interpersonal relationships, and geographical location were also reviewed in relation to cyberbullying. As for protective factors, empathy and emotional intelligence, parent-child relationship, and school climate were frequently mentioned.

Conclusion: The prevalence rate of cyberbullying has increased significantly in the observed 5-year period, and it is imperative that researchers from low and middle income countries focus sufficient attention on cyberbullying of children and adolescents. Despite a lack of scientific intervention research on cyberbullying, the review also identified several promising strategies for its prevention from the perspectives of youths, parents and schools. More research on cyberbullying is needed, especially on the issue of cross-national cyberbullying. International cooperation, multi-pronged and systematic approaches are highly encouraged to deal with cyberbullying.

Introduction

Childhood and adolescence are not only periods of growth, but also of emerging risk taking. Young people during these periods are particularly vulnerable and cannot fully understand the connection between behaviors and consequences ( 1 ). With peer pressures, the heat of passion, children and adolescents usually perform worse than adults when people are required to maintain self-discipline to achieve good results in unfamiliar situations. Impulsiveness, sensation seeking, thrill seeking, and other individual differences cause adolescents to risk rejecting standardized risk interventions ( 2 ).

About one-third of Internet users in the world are children and adolescents under the age of 18 ( 3 ). Digital technology provide a new form of interpersonal communication ( 4 ). However, surveys and news reports also show another picture in the Internet Age. The dark side of young people's internet usage is that they may bully or suffer from others' bullying in cyberspace. This behavior is also acknowledged as cyberbullying ( 5 ). Based on Olweus's definition, cyberbullying is usually regarded as bullying implemented through electronic media ( 6 , 7 ). Specifically, cyberbullying among children and adolescents can be summarized as the intentional and repeated harm from one or more peers that occurs in cyberspace caused by the use of computers, smartphones and other devices ( 4 , 8 – 12 ). In recent years, new forms of cyberbullying behaviors have emerged, such as cyberstalking and online dating abuse ( 13 – 15 ).

Although cyberbullying is still a relatively new field of research, cyberbullying among adolescents is considered to be a serious public health issue that is closely related to adolescents' behavior, mental health and development ( 16 , 17 ). The increasing rate of Internet adoption worldwide and the popularity of social media platforms among the young people have worsened this situation with most children and adolescents experiencing cyberbullying or online victimization during their lives. The confines of space and time are alleviated for bullies in virtual environments, creating new venues for cyberbullying with no geographical boundaries ( 6 ). Cyberbullying exerts negative effects on many aspects of young people's lives, including personal privacy invasion and psychological disorders. The influence of cyberbullying may be worse than traditional bullying as perpetrators can act anonymously and connect easily with children and adolescents at any time ( 18 ). In comparison with traditional victims, those bullied online show greater levels of depression, anxiety and loneliness ( 19 ). Self-esteem problems and school absenteeism have also proven to be related to cyberbullying ( 20 ).

Due to changes in use and behavioral patterns among the youth on social media, the manifestations and risk factors of cyberbullying have faced significant transformation. Further, as the boundaries of cyberbullying are not limited by geography, cyberbullying may not be a problem contained within a single country. In this sense, cyberbullying is a global problem and tackling it requires greater international collaboration. The adverse effects caused by cyberbullying, including reduced safety, lower educational attainment, poorer mental health and greater unhappiness, led UNICEF to state that “no child is absolutely safe in the digital world” ( 3 ).

Extant research has examined the prevalence and risk factors of cyberbullying to unravel the complexity of cyberbullying across different countries and their corresponding causes. However, due to variations in cyberbullying measurement and methodologies, no consistent conclusions have been drawn ( 21 ). Studies into inconsistencies in prevalence rates of cyberbullying, measured in the same country during the same time period, occur frequently. Selkie et al. systematically reviewed cyberbullying among American middle and high school students aged 10–19 years old in 2015, and revealed that the prevalence of cyberbullying victimization ranged from 3 to 72%, while perpetration ranged from 1 to 41% ( 22 ). Risk and protective factors have also been broadly studied, but confirmation is still needed of those factors which have more significant effects on cyberbullying among young people. Clarification of these issues would be useful to allow further research to recognize cyberbullying more accurately.

This review aims to extend prior contributions and provide a comprehensive review of cyberbullying of children and adolescents from a global perspective, with the focus being on prevalence, associated risk factors and protective factors across countries. It is necessary to provide a global panorama based on research syntheses to fill the gaps in knowledge on this topic.

Search Strategies

This study strictly employed Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. We consulted eight academic databases pertaining to public health, and communication and psychology, namely: Web of Science, Science Direct, PubMed, Google Scholar, ProQuest, Communication & Mass Media Complete, CINAHL, and PsycArticles. Additional records identified through other sources included the references of reviews and two websites, Cyberbullying Research Center and United Nations Children's Fund. With regard to the duration of our review, since most studies on cyberbullying arose around 2015 ( 9 , 21 ), this study highlights the complementary aspects of the available information about cyberbullying during the recent 5 year period from January 1st, 2015 to December 31st, 2019.

One researcher extracted keywords and two researchers proposed modifications. We used two sets of subject terms to review articles, “cyberbullying” and “child OR adolescent.” Some keywords that refer to cyberbullying behaviors and young people are also included, such as threat, harass, intimidate, abuse, insult, humiliate, condemn, isolate, embarrass, forgery, slander, flame, stalk, manhunt, as well as teen, youth, young people and student. The search formula is (cyberbullying OR cyber-bullying OR cyber-aggression OR ((cyber OR online OR electronic OR Internet) AND (bully * OR aggres * OR violence OR perpetrat * OR victim * OR threat * OR harass * OR intimidat * OR * OR insult * OR humiliate * OR condemn * OR isolate * OR embarrass * OR forgery OR slander * OR flame OR stalk * OR manhunt))) AND (adolescen * OR child OR children OR teen? OR teenager? OR youth? OR “young people” OR “elementary school student * ” OR “middle school student * ” OR “high school student * ”). The main search approach is title search. Search strategies varied according to the database consulted, and we did not limit the type of literature for inclusion. Journals, conference papers and dissertations are all available.

Specifically, the inclusion criteria for our study were as follows: (a). reported or evaluated the prevalence and possible risk factors associated with cyberbullying, (b). respondents were students under the age of 18 or in primary, junior or senior high schools, and (c). studies were written in English. Exclusion criteria were: (a). respondents came from specific groups, such as clinical samples, children with disabilities, sexual minorities, specific ethnic groups, specific faith groups or samples with cross-national background, (b). review studies, qualitative studies, conceptual studies, book reviews, news reports or abstracts of meetings, and (c). studies focused solely on preventive measures that were usually meta-analytic and qualitative in nature. Figure 1 presents the details of the employed screening process, showing that a total of 63 studies out of 2070 were included in our final review.

www.frontiersin.org

Figure 1 . PRISMA flow chart diagram showing the process of study selection for inclusion in the systematic review on children and adolescents cyberbullying.

Meta-analysis was not conducted as the limited research published within the 5 years revealed little research which reported odds ratio. On the other hand, due to the inconsistency of concepts, measuring instruments and recall periods, considerable variation could be found in research quality ( 23 ). Meta-analysis is not a preferred method.

Coding Scheme

For coding, we created a comprehensive code scheme to include the characteristics. For cyberbullying, we coded five types proposed by Willard ( 24 – 26 ), which included verbal violence, group violence, visual violence, impersonating and account forgery, and other behaviors. Among them, verbal violence is considered one of the most common types of cyberbullying and refers to the behavior of offensive responses, insults, mocking, threats, slander, and harassment. Group violence is associated with preventing others from joining certain groups or isolating others, forcing others to leave the group. Visual violence relates to the release and sharing of embarrassing photos and information without the owners' consent. Impersonating and account forgery refers to identity theft, stealing passwords, violating accounts and the creation of fake accounts to fraudulently present the behavior of others. Other behaviors include disclosure of privacy, sexual harassment, and cyberstalking. To comprehensively examine cyberbullying, we coded cyberbullying behaviors from both the perspectives of cyberbullying perpetrators and victims, if mentioned in the studies.

In relation to risk factors, we drew insights from the general aggression model, which contributes to the understanding of personal and situational factors in the cyberbullying of children and adolescents. We chose the general aggression model because (a) it contains more situational factors than other models (e.g., social ecological models) - such as school climate ( 9 ), and (b) we believe that the general aggression model is more suitable for helping researchers conduct a systematic review of cyberbullying risk and protective factors. This model provides a comprehensive framework that integrates domain specific theories of aggression, and has been widely applied in cyberbullying research ( 27 ). For instance, Kowalski and colleagues proposed a cyberbullying encounter through the general aggression model to understand the formation and development process of youth cyberbullying related to both victimization and perpetration ( 9 ). Victims and perpetrators enter the cyberbullying encounter with various individual characteristics, experiences, attitudes, desires, personalities, and motives that intersect to determine the course of the interaction. Correspondingly, the antecedents pertaining to cyberbullying are divided into two broad categories, personal factors and situational factors. Personal factors refer to individual characteristics, such as gender, age, motivation, personality, psychological states, socioeconomic status and technology use, values and perceptions, and other maladaptive behaviors. Situational factors focus on the provocation/support, parental involvement, school climate, and perceived anonymity. Consequently, our coders related to risk factors consisting of personal factors and situational factors from the perspectives of both cyberbullying perpetrators and victims.

We extracted information relating to individual papers and sample characteristics, including authors, year of publication, country, article type, sampling procedures, sample characteristics, measures of cyberbullying, and prevalence and risk factors from both cyberbullying perpetration and victimization perspectives. The key words extraction and coding work were performed twice by two trained research assistants in health informatics. The consistency test results are as follows: the Kappa value with “personal factors” was 0.932, and the Kappa value with “situational factors” was 0.807. The result shows that the coding consistency was high enough and acceptable. Disagreements were resolved through discussion with other authors.

Quality Assessment of Studies

The quality assessment of the studies is based on the recommended tool for assessing risk of bias, Cochrane Collaboration. This quality assessment tool focused on seven items: random sequence generation, allocation concealment, blinding of participants and personnel, blinding of outcome assessment, incomplete outcome data, selective reporting, and other sources of bias ( 28 ). We assessed each item as “low risk,” “high risk,” and “unclear” for included studies. A study is considered of “high quality” when it meets three or more “low risk” requirements. When one or more main flaw of a study may affect the research results, the study is considered as “low quality.” When a lack of information leads to a difficult judgement, the quality is considered to be “unclear.” Please refer to Appendix 1 for more details.

This comprehensive systematic review comprised a total of 63 studies. Appendices 2 , 3 show the descriptive information of the studies included. Among them, 58 (92%) studies measured two or more cyberbullying behavior types. The sample sizes of the youths range from several hundred to tens of thousands, with one thousand to five thousand being the most common. As for study distribution, the United States of America, Spain and China were most frequently mentioned. Table 1 presents the detail.

www.frontiersin.org

Table 1 . Descriptive information of studies included (2015–2019).

Prevalence of Global Cyberbullying

Prevalence across countries.

Among the 63 studies included, 22 studies reported on cyberbullying prevalence and 20 studies reported on prevalence from victimization and perpetration perspectives, respectively. Among the 20 studies, 11 national studies indicated that the prevalence of cyberbullying victimization and cyberbullying perpetration ranged from 14.6 to 52.2% and 6.3 to 32%, respectively. These studies were conducted in the United States of America ( N = 4) ( 29 – 32 ), South Korea ( N = 3) ( 33 – 35 ), Singapore ( N = 1) ( 36 ), Malaysia ( N = 1) ( 37 ), Israel ( N = 1) ( 38 ), and Canada ( N = 1) ( 39 ). Only one of these 11 national studies is from an upper middle income country, and the rest are from highincome countries identified by the World Bank ( 40 ). By combining regional and community-level studies, the prevalence of cyberbullying victimization and cyberbullying perpetration ranged from 13.99 to 57.5% and 6.0 to 46.3%, respectively. Spain reported the highest prevalence of cyberbullying victimization (57.5%) ( 41 ), followed by Malaysia (52.2%) ( 37 ), Israel (45%) ( 42 ), and China (44.5%) ( 43 ). The lowest reported victim rates were observed in Canada (13.99%) and South Korea (14.6%) ( 34 , 39 ). The reported prevalence of cyberbullying victimization in the United States of America ranged from 15.5 to 31.4% ( 29 , 44 ), while in Israel, rates ranged from 30 to 45% ( 26 , 42 ). In China, rates ranged from 6 to 46.3% with the country showing the highest prevalence of cyberbullying perpetration (46.30%) ( 15 , 43 , 45 , 46 ). Canadian and South Korean studies reported the lowest prevalence of cyberbullying perpetration at 7.99 and 6.3%, respectively ( 34 , 39 ).

A total of 10 studies were assessed as high quality studies. Among them, six studies came from high income countries, including Canada, Germany, Italy, Portugal, and South Korea ( 13 , 34 , 39 , 46 – 48 ). Three studies were from upper middle income countries, including Malaysia and China ( 37 , 43 ) and one from a lower middle income country, Nigeria ( 49 ). Figures 2 , 3 describe the prevalence of cyberbullying victimization and perpetration respectively among high quality studies.

www.frontiersin.org

Figure 2 . The prevalence of cyberbullying victimization of high quality studies.

www.frontiersin.org

Figure 3 . The prevalence of cyberbullying perpetration of high quality studies.

Prevalence of Various Cyberbullying Behaviors

For the prevalence of cyberbullying victimization and perpetration, the data were reported in 18 and 14 studies, respectively. Figure 4 shows the distribution characteristics of the estimated value of prevalence of different cyberbullying behaviors with box plots. The longer the box, the greater the degree of variation of the numerical data and vice versa. The rate of victimization and crime of verbal violence, as well as the rate of victimization of other behaviors, such as cyberstalking and digital dating abuse, has a large degree of variation. Among the four specified types of cyberbullying behaviors, verbal violence was regarded as the most commonly reported behaviors in both perpetration and victimization rates, with a wide range of prevalence, ranging from 5 to 18%. Fewer studies reported the prevalence data for visual violence and group violence. Studies also showed that the prevalence of impersonation and account forgery were within a comparatively small scale. Specific results were as follows.

www.frontiersin.org

Figure 4 . Cyberbullying prevalence across types (2015–2019).

Verbal Violence

A total of 13 studies reported verbal violence prevalence data ( 15 , 26 , 34 , 37 – 39 , 42 , 43 , 47 , 48 , 50 , 51 ). Ten studies reported the prevalence of verbal violence victimization ranging from 2.8 to 47.5%, while seven studies claimed perpetration prevalence ranging from 1.5 to 31.8%. Malaysia reported the highest prevalence of verbal violence victimization (47.5%) ( 37 ), followed by China (32%) ( 43 ). China reported that the prevalence of verbal violence victimization ranged from 5.1 to 32% ( 15 , 43 ). Israel reported that the prevalence of verbal violence victimization ranged from 3.4 to 18% ( 26 , 38 , 42 ). For perpetration rate, Malaysia reported the highest level at 31.8% ( 37 ), while a study for Spain reported the lowest, ranging from 3.2 to 6.4% ( 51 ).

Group Violence

The prevalence of group violence victimization was explored within 4 studies and ranged from 5 to 17.8% ( 26 , 34 , 42 , 43 ), while perpetration prevalence was reported in three studies, ranging from 10.1 to 19.07% ( 34 , 43 , 47 ). An Israeli study suggested that 9.8% of respondents had been excluded from the Internet, while 8.9% had been refused entry to a group or team ( 26 ). A study in South Korea argued that the perpetration prevalence of group violence was 10.1% ( 34 ), while a study in Italy reported that the rate of online group violence against others was 19.07% ( 47 ).

Visual Violence

The prevalence of visual violence victimization was explored within three studies and ranged from 2.6 to 12.1% ( 26 , 34 , 43 ), while the perpetration prevalence reported in four studies ranged from 1.7 to 6% ( 34 , 43 , 47 , 48 ). For victimization prevalence, a South Korean study found that 12.1% of respondents reported that their personal information was leaked online ( 34 ). An Israel study reported that the prevalence of outing the picture was 2.6% ( 26 ). For perpetration prevalence, a South Korean study found that 1.7% of respondents had reported that they had disclosed someone's personal information online ( 34 ). A German study reported that 6% of respondents had written a message (e.g., an email) to somebody using a fake identity ( 48 ).

Impersonating and Account Forgery

Four studies reported on the victimization prevalence of impersonating and account forgery, ranging from 1.1 to 10% ( 15 , 42 , 43 ), while five studies reported on perpetration prevalence, with the range being from 1.3 to 9.31% ( 15 , 43 , 47 , 48 , 51 ). In a Spanish study, 10% of respondents reported that their accounts had been infringed by others or that they could not access their account due to stolen passwords. In contrast, 4.5% of respondents reported that they had infringed other people's accounts or stolen passwords, with 2.5% stating that they had forged other people's accounts ( 51 ). An Israeli study reported that the prevalence of being impersonated was 7% ( 42 ), while in China, a study reported this to be 8.6% ( 43 ). Another study from China found that 1.1% of respondents had been impersonated to send dating-for-money messages ( 15 ).

Other Behaviors

The prevalence of disclosure of privacy, sexual harassment, and cyberstalking were also explored by scholars. Six studies reported the victimization prevalence of other cyberbullying behaviors ( 13 , 15 , 34 , 37 , 42 , 43 ), and four studies reported on perpetration prevalence ( 34 , 37 , 43 , 48 ). A study in China found that 1.2% of respondents reported that their privacy had been compromised without permission due to disputes ( 15 ). A study from China reported the prevalence of cyberstalking victimization was 11.9% ( 43 ), while a Portuguese study reported that this was 62% ( 13 ). In terms of perpetration prevalence, a Malaysian study reported 2.7% for sexual harassment ( 37 ).

Risk and Protective Factors of Cyberbullying

In terms of the risk factors associated with cyberbullying among children and adolescents, this comprehensive review highlighted both personal and situational factors. Personal factors referred to age, gender, online behavior, race, health conditions, past experiences of victimization, and impulsiveness, while situational factors consisted of parent-child relationship, interpersonal relationships, and geographical location. In addition, protective factors against cyberbullying included: empathy and emotional intelligence, parent-child relationship, and school climate. Table 2 shows the risk and protective factors for child and adolescent cyberbullying.

www.frontiersin.org

Table 2 . Risk and protective factors of cyberbullying among children and adolescents.

In terms of the risk factors associated with cyberbullying victimization at the personal level, many studies evidenced that females were more likely to be cyberbullied than males ( 13 , 26 , 29 , 38 , 43 , 52 , 54 , 55 , 58 ). Meanwhile, adolescents with mental health problems ( 61 ), such as depression ( 33 , 62 ), borderline personality disorder ( 63 ), eating disorders ( 41 ), sleep deprivation ( 56 ), and suicidal thoughts and suicide plans ( 64 ), were more likely to be associated with cyberbullying victimization. As for Internet usage, researchers agreed that youth victims were probably those that spent more time online than their counterparts ( 32 , 36 , 43 , 45 , 48 , 49 , 60 ). For situational risk factors, some studies have proven the relationship between cyberbullying victims and parental abuse, parental neglect, family dysfunction, inadequate monitoring, and parents' inconsistency in mediation, as well as communication issues ( 33 , 64 , 68 , 73 ). In terms of geographical location, some studies have reported that youths residing in city locations are more likely to be victims of cyberbullying than their peers from suburban areas ( 61 ).

Regarding the risk factors of cyberbullying perpetration at the personal level, it is generally believed that older teenagers, especially those aged over 15 years, are at greater risk of becoming cyberbullying perpetrators ( 55 , 67 ). When considering prior cyberbullying experiences, evidence showed that individuals who had experienced cyberbullying or face-to-face bullying tended to be aggressors in cyberbullying ( 35 , 42 , 49 , 51 , 55 ); in addition, the relationship between impulsiveness and cyberbullying perpetration was also explored by several pioneering scholars ( 55 , 72 , 80 ). The situational factors highlight the role of parents and teachers in cyberbullying experiences. For example, over-control and authoritarian parenting styles, as well as inharmonious teacher-student relationships ( 61 ) are perceived to lead to cyberbullying behaviors ( 74 , 75 ). In terms of differences in geographical locations, students residing in cities have a higher rate of online harassment than students living in more rural locations ( 49 ).

In terms of the protective factors in child and adolescent cyberbullying, scholars have focused on youths who have limited experiences of cyberbullying. At the personal level, high emotional intelligence, an ability for emotional self-control and empathy, such as cognitive empathy ability ( 44 , 55 ), were associated with lower rates of cyberbullying ( 57 ). At the situational level, a parent's role is seen as critical. For example, intimate parent-child relationships ( 46 ) and open active communication ( 19 ) were demonstrated to be related to lower experiences of cyberbullying and perpetration. Some scholars argued that parental supervision and monitoring of children's online activities can reduce their tendency to participate in some negative activities associated with cyberbullying ( 31 , 46 , 73 ). They further claimed that an authoritative parental style protects youths against cyberbullying ( 43 ). Conversely, another string of studies evidenced that parents' supervision of Internet usage was meaningless ( 45 ). In addition to conflicting roles of parental supervision, researchers have also looked into the role of schools, and posited that positive school climates contribute to less cyberbullying experiences ( 61 , 79 ).

Some risk factors may be protective factors under another condition. Some studies suggest that parental aggressive communication is related to severe cyberbullying victims, while open communication is a potential protective factor ( 19 ). Parental neglect, parental abuse, parental inconsistency in supervision of adolescents' online behavior, and family dysfunction are related to the direct or indirect harm of cyberbullying ( 33 , 68 ). Parental participation, a good parental-children relationship, communication and dialogue can enhance children's school adaptability and prevent cyberbullying behaviors ( 31 , 74 ). When parental monitoring reaches a balance between control and openness, it could become a protective factor against cyberbullying, and it could be a risk factor, if parental monitoring is too low or over-controlled ( 47 ).

Despite frequent discussion about the risk factors associated with cyberbullying among children and adolescents, some are still deemed controversial factors, such as age, race, gender, and the frequency of suffering on the internet. For cyberbullying victims, some studies claim that older teenagers are more vulnerable to cyberbullying ( 15 , 38 , 52 , 53 ), while other studies found conflicting results ( 26 , 33 ). As for student race, Alhajji et al. argued that non-white students were less likely to report cyberbullying ( 29 ), while Morin et al. observed no significant correlation between race and cyberbullying ( 52 ). For cyberbullying perpetration, Alvarez-Garcia found that gender differences may have indirect effects on cyberbullying perpetration ( 55 ), while others disagreed ( 42 , 61 , 68 – 70 ). Specifically, some studies revealed that males were more likely to become cyberbullying perpetrators ( 34 , 39 , 56 ), while Khurana et al. presented an opposite point of view, proposing that females were more likely to attack others ( 71 ). In terms of time spent on the Internet, some claimed that students who frequently surf the Internet had a higher chance of becoming perpetrators ( 49 ), while others stated that there was no clear and direct association between Internet usage and cyberbullying perpetration ( 55 ).

In addition to personal and situational factors, scholars have also explored other specific factors pertaining to cyberbullying risk and protection. For instance, mindfulness and depression were found to be significantly related to cyber perpetration ( 76 ), while eating disorder psychopathology in adolescents was associated with cyber victimization ( 41 ). For males who were familiar with their victims, such as family members, friends and acquaintances, they were more likely to be cyberstalking perpetrators than females or strangers, while pursuing desired closer relationships ( 13 ). In the school context, a lower social likability in class was identified as an indirect factor for cyberbullying ( 48 ).

This comprehensive review has established that the prevalence of global childhood and adolescent victimization from cyberbullying ranges from 13.99 to 57.5%, and that the perpetration prevalence ranges from 6.0 to 46.3%. Across the studies included in our research, verbal violence is observed as one of the most common acts of cyberbullying, including verbal offensive responses, insults, mocking, threats, slander, and harassment. The victimization prevalence of verbal violence is reported to be between 5 and 47.5%, and the perpetration prevalence is between 3.2 and 26.1%. Personal factors, such as gender, frequent use of social media platforms, depression, borderline personality disorder, eating disorders, sleep deprivation, and suicidal tendencies, were generally considered to be related to becoming a cyberbullying victim. Personal factors, such as high school students, past experiences, impulse, improperly controlled family education, poor teacher-student relationships, and the urban environment, were considered risk factors for cyberbullying perpetration. Situational factors, including parental abuse and neglect, improper monitoring, communication barriers between parents and children, as well as the urban environment, were also seen to potentially contribute to higher risks of both cyberbullying victimization and perpetration.

Increasing Prevalence of Global Cyberbullying With Changing Social Media Landscape and Measurement Alterations

This comprehensive review suggests that global cyberbullying rates, in terms of victimization and perpetration, were on the rise during the 5 year period, from 2015 to 2019. For example, in an earlier study conducted by Modecki et al. the average cyberbullying involvement rate was 15% ( 81 ). Similar observations were made by Hamm et al. who found that the median rates of youth having experienced bullying or who had bullied others online, was 23 and 15.2%, respectively ( 82 ). However, our systematic review summarized global children and adolescents cyberbullying in the last 5 years and revealed an average cyberbullying perpetration rate of 25.03%, ranging from 6.0 to 46.3%, while the average victimization was 33.08%, ranging from 13.99 to 57.5%. The underlying reason for increases may be attributed to the rapid changing landscape of social media and, in recent years, the drastic increase in Internet penetration rates. With the rise in Internet access, youths have greater opportunities to participate in online activities, provided by emerging social media platforms.

Although our review aims to provide a broader picture of cyberbullying, it is well-noted in extant research that difficulties exist in accurately estimating variations in prevalence in different countries ( 23 , 83 ). Many reasons exist to explain this. The first largely relates poor or unclear definition of the term cyberbullying; this hinders the determination of cyberbullying victimization and perpetration ( 84 ). Although traditional bullying behavior is well-defined, the definition cannot directly be applied to the virtual environment due to the complexity in changing online interactions. Without consensus on definitions, measurement and cyberbullying types may vary noticeably ( 83 , 85 ). Secondly, the estimation of prevalence of cyberbullying is heavily affected by research methods, such as recall period (lifetime, last year, last 6 months, last month, or last week etc.), demographic characteristics of the survey sample (age, gender, race, etc.), perspectives of cyberbullying experiences (victims, perpetrators, or both victim and perpetrator), and instruments (scales, study-specific questions) ( 23 , 84 , 86 ). The variety in research tools and instruments used to assess the prevalence of cyberbullying can cause confusion on this issue ( 84 ). Thirdly, variations in economic development, cultural backgrounds, human values, internet penetration rates, and frequency of using social media may lead to different conclusions across countries ( 87 ).

Acknowledging the Conflicting Role of the Identified Risk Factors With More Research Needed to Establish the Causality

Although this review has identified many personal and situational factors associated with cyberbullying, the majority of studies adopted a cross-sectional design and failed to reveal the causality ( 21 ). Nevertheless, knowledge on these correlational relationships provide valuable insights for understanding and preventing cyberbullying incidents. In terms of gender differences, females are believed to be at a higher risk of cyberbullying victimization compared to males. Two reasons may help to explain this. First, the preferred violence behaviors between two genders. females prefer indirect harassment, such as the spreading of rumors, while males tend toward direct bullying (e.g., assault) ( 29 ) and second, the cultural factors. From the traditional gender perspective, females tended to perceive a greater risk of communicating with others on the Internet, while males were more reluctant to express fear, vulnerability and insecurity when asked about their cyberbullying experiences ( 46 ). Females were more intolerant when experiencing cyberstalking and were more likely to report victimization experiences than males ( 13 ). Meanwhile, many researchers suggested that females are frequent users of emerging digital communication platforms, which increases their risk of unpleasant interpersonal contact and violence. From the perspective of cultural norms and masculinity, the reporting of cyberbullying is also widely acknowledged ( 37 ). For example, in addition, engaging in online activities is also regarded as a critical predictor for cyberbullying victimization. Enabled by the Internet, youths can easily find potential victims and start harassment at any time ( 49 ). Participating in online activities directly increases the chance of experiencing cyberbullying victimization and the possibility of becoming a victim ( 36 , 45 ). As for age, earlier involvement on social media and instant messaging tools may increase the chances of experiencing cyberbullying. For example, in Spain, these tools cannot be used without parental permission before the age of 14 ( 55 ). Besides, senior students were more likely to be more impulsive and less sympathetic. They may portray more aggressive and anti-social behaviors ( 55 , 72 ); hence senior students and students with higher impulsivity were usually more likely to become cyberbullying perpetrators.

Past experiences of victimization and family-related factors are another risk for cyberbullying crime. As for past experiences, one possible explanation is that young people who had experienced online or traditional school bullying may commit cyberbullying using e-mails, instant messages, and text messages for revenge, self-protection, or improving their social status ( 35 , 42 , 49 , 55 ). In becoming a cyberbullying perpetrator, the student may feel more powerful and superior, externalizing angry feelings and relieving the feelings of helplessness and sadness produced by past victimization experiences ( 51 ). As for family related factors, parenting styles are proven to be highly correlated to cyberbullying. In authoritative families, parents focus on rational behavioral control with clear rules and a high component of supervision and parental warmth, which have beneficial effects on children's lifestyles ( 43 ). Conversely, in indulgent families, children's behaviors are not heavily restricted and parents guide and encourage their children to adapt to society. The characteristics of this indulgent style, including parental support, positive communication, low imposition, and emotional expressiveness, possibly contribute to more parent-child trust and less misunderstanding ( 75 ). The protective role of warmth/affection and appropriate supervision, which are common features of authoritative or indulgent parenting styles, mitigate youth engagement in cyberbullying. On the contrary, authoritarian and neglectful styles, whether with excessive or insufficient control, are both proven to be risk factors for being a target of cyberbullying ( 33 , 76 ). In terms of geographical location, although several studies found that children residing in urban areas were more likely to be cyberbullying victims than those living in rural or suburban areas, we cannot draw a quick conclusion here, since whether this difference attributes to macro-level differences, such as community safety or socioeconomic status, or micro-level differences, such as teacher intervention in the classroom, courses provided, teacher-student ratio, is unclear across studies ( 61 ). An alternative explanation for this is the higher internet usage rate in urban areas ( 49 ).

Regarding health conditions, especially mental health, some scholars believe that young people with health problems are more likely to be identified as victims than people without health problems. They perceive health condition as a risk factor for cyberbullying ( 61 , 63 ). On the other hand, another group of scholars believe that cyberbullying has an important impact on the mental health of adolescents which can cause psychological distress consequences, such as post-traumatic stress mental disorder, depression, suicidal ideation, and drug abuse ( 70 , 87 ). It is highly possible that mental health could be risk factors, consequences of cyberbullying or both. Mental health cannot be used as standards, requirements, or decisive responses in cyberbullying research ( 13 ).

The Joint Effort Between Youth, Parents, Schools, and Communities to Form a Cyberbullying-Free Environment

This comprehensive review suggests that protecting children and adolescents from cyberbullying requires joint efforts between individuals, parents, schools, and communities, to form a cyberbullying-free environment. For individuals, young people are expected to improve their digital technology capabilities, especially in the use of social media platforms and instant messaging tools ( 55 ). To reduce the number of cyberbullying perpetrators, it is necessary to cultivate emotional self-regulation ability through appropriate emotional management training. Moreover, teachers, counselors, and parents are required to be armed with sufficient knowledge of emotional management and to develop emotional management capabilities and skills. In this way, they can be alert to the aggressive or angry emotions expressed by young people, and help them mediate any negative emotions ( 45 ), and avoid further anti-social behaviors ( 57 ).

For parents, styles of parenting involving a high level of parental involvement, care and support, are desirable in reducing the possibility of children's engagement in cyberbullying ( 74 , 75 ). If difficulties are encountered, open communication can contribute to enhancing the sense of security ( 73 ). In this vein, parents should be aware of the importance of caring, communicating and supervising their children, and participate actively in their children's lives ( 71 ). In order to keep a balance between control and openness ( 47 ), parents can engage in unbiased open communication with their children, and reach an agreement on the usage of computers and smart phones ( 34 , 35 , 55 ). Similarly, it is of vital importance to establish a positive communication channel with children ( 19 ).

For schools, a higher priority is needed to create a safe and positive campus environment, providing students with learning opportunities and ensuring that every student is treated equally. With a youth-friendly environment, students are able to focus more on their academic performance and develop a strong sense of belonging to the school ( 79 ). For countries recognizing collectivist cultural values, such as China and India, emphasizing peer attachment and a sense of collectivism can reduce the risk of cyberbullying perpetration and victimization ( 78 ). Besides, schools can cooperate with mental health agencies and neighboring communities to develop preventive programs, such as extracurricular activities and training ( 44 , 53 , 62 ). Specifically, school-based preventive measures against cyberbullying are expected to be sensitive to the characteristics of young people at different ages, and the intersection of race and school diversity ( 29 , 76 ). It is recommended that school policies that aim to embrace diversity and embody mutual respect among students are created ( 26 ). Considering the high prevalence of cyberbullying and a series of serious consequences, it is suggested that intervention against cyberbullying starts from an early stage, at about 10 years old ( 54 ). Schools can organize seminars to strengthen communication between teachers and students so that they can better understand the needs of students ( 61 ). In addition, schools should encourage cyberbullying victims to seek help and provide students with opportunities to report cyberbullying behaviors, such as creating online anonymous calls.

Conclusions and Limitations

The comprehensive study has reviewed related research on children and adolescents cyberbullying across different countries and regions, providing a positive understanding of the current situation of cyberbullying. The number of studies on cyberbullying has surged in the last 5 years, especially those related to risk factors and protective factors of cyberbullying. However, research on effective prevention is insufficient and evaluation of policy tools for cyberbullying intervention is a nascent research field. Our comprehensive review concludes with possible strategies for cyberbullying prevention, including personal emotion management, digital ability training, policy applicability, and interpersonal skills. We highlight the important role of parental control in cyberbullying prevention. As for the role of parental control, it depends on whether children believe their parents are capable of adequately supporting them, rather than simply interfering in their lives, restricting their online behavior, and controlling or removing their devices ( 50 ). In general, cyberbullying is on the rise, with the effectiveness of interventions to meet this problem still requiring further development and exploration ( 83 ).

Considering the overlaps between cyberbullying and traditional offline bullying, future research can explore the unique risk and protective factors that are distinguishable from traditional bullying ( 86 ). To further reveal the variations, researchers can compare the outcomes of interventions conducted in cyberbullying and traditional bullying preventions simultaneously, and the same interventions only targeting cyberbullying ( 88 ). In addition, cyberbullying also reflects a series of other social issues, such as personal privacy and security, public opinion monitoring, multinational perpetration and group crimes. To address this problem, efforts from multiple disciplines and novel analytical methods in the digital era are required. As the Internet provides enormous opportunities to connect young people from all over the world, cyberbullying perpetrators may come from transnational networks. Hence, cyberbullying of children and adolescents, involving multiple countries, is worth further attention.

Our study has several limitations. First, national representative studies are scarce, while few studies from middle and low income countries were included in our research due to language restrictions. Many of the studies included were conducted in schools, communities, provinces, and cities in high income countries. Meanwhile, our review only focused on victimization and perpetration. Future studies should consider more perspectives, such as bystanders and those with the dual identity of victim/perpetrator, to comprehensively analyze the risk and protective factors of cyberbullying.

Data Availability Statement

The original contributions presented in the study are included in the article/ Supplementary Material , further inquiries can be directed to the corresponding author/s.

Author Contributions

SH, CZ, RE, and WZ conceived the study and developed the design. WZ analyzed the result and supervised the study. CZ and SH wrote the first draft. All authors contributed to the article and approved the submitted version.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Supplementary Material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpubh.2021.634909/full#supplementary-material

1. Ang RP. Adolescent cyberbullying: a review of characteristics, prevention and intervention strategies. Aggress Violent Behav. (2015) 25:35–42. doi: 10.1016/j.avb.2015.07.011

CrossRef Full Text | Google Scholar

2. Reyna VF, Farley F. Risk and rationality in adolescent decision making: implications for theory, practice, and public policy. Psychol Sci Public Interest. (2006) 7:1–44. doi: 10.1111/j.1529-1006.2006.00026.x

PubMed Abstract | CrossRef Full Text | Google Scholar

3. UNICEF ed. Children in a Digital World . New York, NY: UNICEF (2017).

Google Scholar

4. Thomas HJ, Connor JP, Scott JG. Integrating traditional bullying and cyberbullying: challenges of definition and measurement in adolescents - a review. Educ Psychol Rev. (2015) 27:135–52. doi: 10.1007/s10648-014-9261-7

5. Baldry AC, Farrington DP, Sorrentino A. “Am I at risk of cyberbullying”? A narrative review and conceptual framework for research on risk of cyberbullying and cybervictimization: the risk and needs assessment approach. Aggress Violent Behav. (2015) 23:36–51. doi: 10.1016/j.avb.2015.05.014

6. Olweus D. Bullying at School: What We Know and What We Can Do . Oxford; Cambridge, MA: Blackwell (1993).

PubMed Abstract | Google Scholar

7. Dooley JJ, Pyzalski J, Cross D. Cyberbullying versus face-to-face bullying: a theoretical and conceptual review. J Psychol. (2009) 217:182–8. doi: 10.1027/0044-3409.217.4.182

8. Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N. Cyberbullying: its nature and impact in secondary school pupils. J Child Psychol Psychiatry. (2008) 49:376–85. doi: 10.1111/j.1469-7610.2007.01846.x

9. Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR. Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol Bull. (2014) 140:1073–137. doi: 10.1037/a0035618

10. León Vicente I. Cybervictimization by cyberbullying: children at risk and children as risk (dissertation). University of the Basque Country, Leioa, Spain (2016).

11. Hinduja S, Patchin JW. Identification, Prevention, and Response. (2020).

12. Jadambaa A, Thomas HJ, Scott JG, Graves N, Brain D, Pacella R. Prevalence of traditional bullying and cyberbullying among children and adolescents in Australia: a systematic review and meta-analysis. Aust N Z J Psychiatry. (2019) 53:878–88. doi: 10.1177/0004867419846393

13. Pereira F, Matos M. Cyber-stalking victimization: what predicts fear among Portuguese adolescents? Eur J Crim Policy Res. (2016) 22:253–70. doi: 10.1007/s10610-015-9285-7

14. Reed LA, Ward LM, Tolman RM, Lippman JR, Seabrook RC. The association between stereotypical gender and dating beliefs and digital dating abuse perpetration in adolescent dating relationships. J Interpers Violence . (2018). doi: 10.1177/0886260518801933

15. Huang CL, Yang SC, Hsieh LS. The cyberbullying behavior of Taiwanese adolescents in an online gaming environment. Children Youth Serv Rev. (2019) 106:104461. doi: 10.1016/j.childyouth.2019.104461

16. Raskauskas J, Huynh A. The process of coping with cyberbullying: a systematic review. Aggress Violent Behav. (2015) 23:118–25. doi: 10.1016/j.avb.2015.05.019

17. Bradshaw J, Crous G, Rees G, Turner N. Comparing children's experiences of schools-based bullying across countries. Children Youth Serv Rev. (2017) 80:171–80. doi: 10.1016/j.childyouth.2017.06.060

18. Hutson E, Kelly S, Militello LK. Systematic review of cyberbullying interventions for youth and parents with implications for evidence-based practice. Worldviews Evid Based Nurs. (2018) 15:72–9. doi: 10.1111/wvn.12257

19. Larranaga E, Yubero S, Ovejero A, Navarro R. Loneliness, parent-child communication and cyberbullying victimization among Spanish youths. Comp Hum Behav. (2016) 65:1–8. doi: 10.1016/j.chb.2016.08.015

20. van Geel M, Vedder P, Tanilon J. Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: a meta-analysis. JAMA Pediatr. (2014) 168:435–42. doi: 10.1001/jamapediatrics.2013.4143

21. Zych I, Ortega-Ruiz R, Del Rey R. Systematic review of theoretical studies on bullying and cyberbullying: facts, knowledge, prevention, and intervention. Aggress Violent Behav. (2015) 23:1–21. doi: 10.1016/j.avb.2015.10.001

22. Selkie EM, Kota R, Chan Y-F, Moreno M. Cyberbullying, depression, and problem alcohol use in female college students: a multisite study. Cyberpsychol Behav Soc Netw. (2015) 18:79–86. doi: 10.1089/cyber.2014.0371

23. Brochado S, Soares S, Fraga S. A scoping review on studies of cyberbullying prevalence among adolescents. Trauma Violence Abus. (2017) 18:523–31. doi: 10.1177/1524838016641668

24. Nocentini A, Calmaestra J, Schultze-Krumbholz A, Scheithauer H, Ortega R, Menesini E. Cyberbullying: labels, behaviours and definition in three European Countries. Aust J Guid Couns. (2010) 20:129–42. doi: 10.1375/ajgc.20.2.129

25. Willard NE. Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress . Champaign: Research Press (2007).

26. Aizenkot D, Kashy-Rosenbaum G. Cyberbullying victimization in whatsapp classmate groups among Israeli Elementary, Middle, and High School Students. J Interpers Violence . (2019). doi: 10.1177/0886260519842860

27. Anderson CA, Bushman BJ. Human aggression. Ann Rev Psychol. (2002) 53:27–51. doi: 10.1146/annurev.psych.53.100901.135231

28. Higgins JP, Green S. Cochrane Handbook for Systematic Reviews of Interventions . (2011). Available online at: http://handbook-5-1.cochrane.org/ (accessed January 17, 2021).

29. Alhajji M, Bass S, Dai T. Cyberbullying, mental health, and violence in adolescents and associations with sex and race: data from the 2015 youth risk behavior survey. Global Pediatr Health . (2019) 6:2333794X19868887. doi: 10.1177/2333794X19868887

30. Grinshteyn E, Yang YT. The association between electronic bullying and school absenteeism among high school students in the United States. J School Health. (2017) 87:142–9. doi: 10.1111/josh.12476

31. Mesch GS. Parent-child connections on social networking sites and cyberbullying. Youth Soc. (2018) 50:1145–62. doi: 10.1177/0044118X16659685

32. Sam J, Wisniewski P, Xu H, Rosson MB, Carroll JM. How are social capital and parental mediation associated with cyberbullying and cybervictimization among youth in the United States? In: Stephanidis C, editor. HCI International 2017 – Posters' Extended Abstracts Communications in Computer Information Science Cham: Springer International Publishing. p. 638–644.

33. Hong JS, Kim DH, Thornberg R, Kang JH, Morgan JT. Correlates of direct and indirect forms of cyberbullying victimization involving South Korean adolescents: an ecological perspective. Comput Hum Behav. (2018) 87:327–36. doi: 10.1016/j.chb.2018.06.010

34. Lee C, Shin N. Prevalence of cyberbullying and predictors of cyberbullying perpetration among Korean adolescents. Comp Hum Behav. (2017) 68:352–8. doi: 10.1016/j.chb.2016.11.047

35. You S, Lim SA. Longitudinal predictors of cyberbullying perpetration: evidence from Korean middle school students. Person Ind Differ. (2016) 89:172–6. doi: 10.1016/j.paid.2015.10.019

36. Holt TJ, Fitzgerald S, Bossler AM, Chee G, Ng E. Assessing the risk factors of cyber and mobile phone bullying victimization in a nationally representative sample of Singapore Youth. Int J Offend Ther Comp Criminol. (2016) 60:598–615. doi: 10.1177/0306624X14554852

37. Marret MJ, Choo WY. Factors associated with online victimisation among Malaysian adolescents who use social networking sites: a cross-sectional study. BMJ Open. (2017) 7:e014959. doi: 10.1136/bmjopen-2016-014959

38. Tesler R, Nissanholtz-Gannot R, Zigdon A, Harel-Fisch Y. The association of cyber-bullying and adolescents in religious and secular schools in Israel. J Relig Health. (2019) 58:2095–109. doi: 10.1007/s10943-019-00938-z

39. Beran T, Mishna F, McInroy LB, Shariff S. Children's experiences of cyberbullying: a Canadian National Study. Child School. (2015) 37:207–14. doi: 10.1093/cs/cdv024

40. World Bank Country and Lending Groups – World Bank Data Help Desk. Available online at: https://datahelpdesk.worldbank.org/knowledgebase/articles/906519-world-bank-country-and-lending-groups [accessed January 25, 2021).

41. Marco JH, Tormo-Irun P. Cyber victimization is associated with eating disorder psychopathology in adolescents. Front Psychol. (2018) 9:987. doi: 10.3389/fpsyg.2018.00987

42. Olenik-Shemesh D, Heiman T. Cyberbullying victimization in adolescents as related to body esteem, social support, and social self-efficacy. J Genet Psychol. (2017) 178:28–43. doi: 10.1080/00221325.2016.1195331

43. Rao J, Wang H, Pang M, Yang J, Zhang J, Ye Y, et al. Cyberbullying perpetration and victimisation among junior and senior high school students in Guangzhou, China. Inj Prev. (2019) 25:13–9. doi: 10.1136/injuryprev-2016-042210

44. Lee C. Weak Commitment to School, Deviant Peers, and Cyberbullying Victimization-Strain in Adolescent Cyberbullying . (2017). Available online at: https://search.proquest.com/pqdtglobal/docview/1937915933/abstract/9D85437600564444PQ/30 (accessed June 17, 2020).

45. Lin MT. Risk factors associated with cyberbullying victimization and perpetration among Taiwan children (dissertation). The University of Texas, Austin, TX, United States (2019).

46. Pieschl S, Porsch T. The complex relationship between cyberbullying and trust. Int J Dev Sci. (2017) 11:9–17. doi: 10.3233/DEV-160208

47. Brighi A, Menin D, Skrzypiec G, Guarini A. Young, bullying, and connected. Common pathways to cyberbullying and problematic internet use in adolescence. Front Psychol. (2019) 10:1467. doi: 10.3389/fpsyg.2019.01467

48. Festl R. Perpetrators on the internet: analyzing individual and structural explanation factors of cyberbullying in school context. Comp Hum Behav. (2016) 59:237–48. doi: 10.1016/j.chb.2016.02.017

49. Olumide AO, Adams P, Amodu OK. Prevalence and correlates of the perpetration of cyberbullying among in-school adolescents in Oyo State, Nigeria. Int J Adolesc Med Health. (2016) 28:183–91. doi: 10.1515/ijamh-2015-0009

50. Baldry AC, Sorrentino A, Farrington DP. Cyberbullying and cybervictimization versus parental supervision, monitoring and control of adolescents' online activities. Child Youth Serv Rev. (2019) 96:302–7. doi: 10.1016/j.childyouth.2018.11.058

51. Garaigordobil M. Cyberbullying in adolescents and youth in the Basque Country: prevalence of cybervictims, cyberaggressors, and cyberobservers. J Youth Stud. (2015) 18:569–82. doi: 10.1080/13676261.2014.992324

52. Morin HK, Bradshaw CP, Kush JM. Adjustment outcomes of victims of cyberbullying: the role of personal and contextual factors. J School Psychol. (2018) 70:74–88. doi: 10.1016/j.jsp.2018.07.002

53. Baraldsnes D. The prevalence of cyberbullying and the views of 5-12 grade pupils and teachers on cyberbullying prevention in Lithuanian Schools. Uinv J Educ Res. (2015) 3:949–59. doi: 10.13189/ujer.2015.031201

54. Razjouyan K, Mobarake AH, Sadr SS, Ardestani SMS, Yaseri M. The relationship between emotional intelligence and the different roles in cyberbullying among high school students in Tehran. Iran J Psychiatry Behav Sci. (2018) 12:UNSP e11560. doi: 10.5812/ijpbs.11560

55. Alvarez-Garcia D, Carlos Nunez J, Garcia T, Barreiro-Collazo A. Individual, family, and community predictors of cyber-aggression among adolescents. Eur J Psychol Appl Legal Context. (2018) 10:79–88. doi: 10.5093/ejpalc2018a8

56. Horzum MB, Ayas T, Randler C, Dusunceli B. The effects of empathy and circadian preference on cyberbullying of adolescents in Turkey. Biol Rhythm Res . (2019). doi: 10.1080/09291016.2019.1603839

57. Carmen Martinez-Monteagudo M, Delgado B, Manuel Garcia-Fernandez J, Rubio E. Cyberbullying, aggressiveness, and emotional intelligence in adolescence. Int J Environ Res Public Health. (2019) 16:5079. doi: 10.3390/ijerph16245079

58. Sasson H, Mesch G. The role of parental mediation and peer norms on the likelihood of cyberbullying. J Genet Psychol. (2017) 178:15–27. doi: 10.1080/00221325.2016.1195330

59. Wang X, Lei L, Liu D, Hu H. Moderating effects of moral reasoning and gender on the relation between moral disengagement and cyberbullying in adolescents. Person Ind Differ. (2016) 98:244–9. doi: 10.1016/j.paid.2016.04.056

60. Simsek N, Sahin D, Evli M. Internet addiction, cyberbullying, and victimization relationship in adolescents a sample from Turkey. J Addict Nurs. (2019) 30:201–10. doi: 10.1097/JAN.0000000000000296

61. McQuillan BE. Ecological Factors Associated with Middle School Students' Experiences of Cyberbullying . (2016). Available online at: https://search.proquest.com/pqdtglobal/docview/1794167537/abstract/9D85437600564444PQ/4 (accessed June 17, 2020).

62. Rose CA, Tynes BM. Longitudinal associations between cybervictimization and mental health among U.S. adolescents. J Adolesc Health. (2015) 57:305–12. doi: 10.1016/j.jadohealth.2015.05.002

63. Stockdale LA, Coyne SM, Nelson DA, Erickson DH. Borderline personality disorder features, jealousy, and cyberbullying in adolescence. Pers Individ Differ. (2015) 83:148–53. doi: 10.1016/j.paid.2015.04.003

64. Chen Q, Lo Camilla KM, Yuhong Z, Anne C, Ling CK, Patrick I. Family poly-victimization and cyberbullying among adolescents in a Chinese school sample. Child Abuse Negl. (2018) 77:180–7. doi: 10.1016/j.chiabu.2018.01.015

65. Landoll RR, La Greca AM, Lai BS, Chan SF, Herge WM. Cyber victimization by peers: prospective associations with adolescent social anxiety and depressive symptoms. J Adolesc. (2015) 42:77–86. doi: 10.1016/j.adolescence.2015.04.002

66. Iranzo B, Buelga S, Cava M-J, Ortega-Baron J. Cyberbullying, psychosocial adjustment, and suicidal ideation in adolescence. Psychosoc Interv. (2019) 28:75–81. doi: 10.5093/pi2019a5

67. Buelga S, Cava MJ, Musitu G, Torralba E. Cyberbullying aggressors among Spanish secondary education students: an exploratory study. Interact Tech Smart Ed. (2015) 12:100–15. doi: 10.1108/ITSE-08-2014-0025

68. Katz I, Lemish D, Cohen R, Arden A. When parents are inconsistent: parenting style and adolescents' involvement in cyberbullying. J Adolesc. (2019) 74:1–2. doi: 10.1016/j.adolescence.2019.04.006

69. Cénat JM, Blais M, Lavoie F, Caron P-O, Hébert M. Cyberbullying victimization and substance use among Quebec high schools students: the mediating role of psychological distress. Comp Hum Behav. (2018) 89:207–12. doi: 10.1016/j.chb.2018.08.014

70. Hoareau N, Bages C, Allaire M, Guerrien A. The role of psychopathic traits and moral disengagement in cyberbullying among adolescents. Crim Behav Ment Health. (2019) 29:321–31. doi: 10.1002/cbm.2135

71. Khurana A, Bleakley A, Jordan A, Romer D. The protective effects of parental monitoring and internet restriction on adolescents' risk of online harassment. J Youth Adolesc. (2015) 44:1039–47. doi: 10.1007/s10964-014-0242-4

72. Martínez I, Murgui S, Garcia OF, Garcia F. Parenting in the digital era: protective and risk parenting styles for traditional bullying and cyberbullying victimization. Comp Hum Behav. (2019) 90:84–92. doi: 10.1016/j.chb.2018.08.036

73. Yusuf S, Salleh H, Bahaman A, Shamsul M, Ramli N, Ramli AN, et al. Parental attachment and cyberbullying experiences among Malaysian children. Pertanika J Scholarly Res Rev . (2018) 4:67–80.

74. Martinez-Ferrer B, Leon-Moreno C, Musitu-Ferrer D, Romero-Abrio A, Callejas-Jeronimo JE, Musitu-Ochoa G. Parental socialization, school adjustment and cyber-aggression among adolescents. Int J Environ Res Public Health. (2019) 16:4005. doi: 10.3390/ijerph16204005

75. Moreno–Ruiz D, Martínez–Ferrer B, García–Bacete F. Parenting styles, cyberaggression, and cybervictimization among adolescents. Comp Hum Behav. (2019) 93:252–9. doi: 10.1016/j.chb.2018.12.031

76. Ho SS, Chen L, Ng APY. Comparing cyberbullying perpetration on social media between primary and secondary school students. Comp Educ. (2017) 109:74–84. doi: 10.1016/j.compedu.2017.02.004

77. Gómez-Ortiz O, Romera EM, Ortega-Ruiz R, Del Rey R. Parenting practices as risk or preventive factors for adolescent involvement in cyberbullying: contribution of children and parent gender. Int J Environ Res Public Health. (2018) 15:2664. doi: 10.3390/ijerph15122664

78. Wright MF, Kamble SV, Soudi SP. Indian adolescents' cyber aggression involvement and cultural values: the moderation of peer attachment. Sch Psychol Int. (2015) 36:410–27. doi: 10.1177/0143034315584696

79. Holfeld B, Leadbeater BJ. Concurrent and longitudinal associations between early adolescents' experiences of school climate and cyber victimization. Comput Hum Behav. (2017) 76:321–8. doi: 10.1016/j.chb.2017.07.037

80. Álvarez-García D, Núñez JC, González-Castro P, Rodríguez C, Cerezo R. The effect of parental control on cyber-victimization in adolescence: the mediating role of impulsivity and high-risk behaviors. Front Psychol. (2019) 10:1159. doi: 10.3389/fpsyg.2019.01159

81. Modecki KL, Minchin J, Harbaugh AG, Guerra NG, Runions KC. Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying. J Adolesc Health. (2014) 55:602–11. doi: 10.1016/j.jadohealth.2014.06.007

82. Hamm MP, Newton AS, Chisholm A, Shulhan J, Milne A, Sundar P, et al. Prevalence and effect of cyberbullying on children and young people: a scoping review of social media studies. JAMA Pediatr. (2015) 169:770. doi: 10.1001/jamapediatrics.2015.0944

83. Gaffney H, Farrington DP, Espelage DL, Ttofi MM. Are cyberbullying intervention and prevention programs effective? A systematic and meta-analytical review. Aggress Violent Behav. (2019) 45:134–53. doi: 10.1016/j.avb.2018.07.002

84. Selkie EM, Fales JL, Moreno MA. Cyberbullying prevalence among US middle and high school-aged adolescents: a systematic review and quality assessment. J Adolesc Health. (2016) 58:125–33. doi: 10.1016/j.jadohealth.2015.09.026

85. Ybarra ML, Boyd D, Korchmaros JD, Oppenheim J. Defining and measuring cyberbullying within the larger context of bullying victimization. J Adolesc Health. (2012) 51:53–8. doi: 10.1016/j.jadohealth.2011.12.031

86. Kowalski RM, Limber SP, McCord A. A developmental approach to cyberbullying: prevalence and protective factors. Aggress Violent Behav. (2019) 45:20–32. doi: 10.1016/j.avb.2018.02.009

87. Dilmac B, Yurt E, Aydin M, Kasarci I. Predictive relationship between humane values of adolescents cyberbullying and cyberbullying sensibility. Electron J Res Educ Psychol. (2016) 14:3–22. doi: 10.14204/ejrep.38.14123

88. Reed KP, Cooper RL, Nugent WR, Russell K. Cyberbullying: a literature review of its relationship to adolescent depression and current intervention strategies. J Hum Behav Soc Environ. (2016) 26:37–45. doi: 10.1080/10911359.2015.1059165

Keywords: cyberbullying, children, adolescents, globalization, risk factors, preventive measures

Citation: Zhu C, Huang S, Evans R and Zhang W (2021) Cyberbullying Among Adolescents and Children: A Comprehensive Review of the Global Situation, Risk Factors, and Preventive Measures. Front. Public Health 9:634909. doi: 10.3389/fpubh.2021.634909

Received: 29 November 2020; Accepted: 10 February 2021; Published: 11 March 2021.

Reviewed by:

Copyright © 2021 Zhu, Huang, Evans and Zhang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) . The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Wei Zhang, weizhanghust@hust.edu.cn

† These authors have contributed equally to this work and share first authorship

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Numbers, Facts and Trends Shaping Your World

Read our research on:

Full Topic List

Regions & Countries

  • Publications
  • Our Methods
  • Short Reads
  • Tools & Resources

Read Our Research On:

  • Teens and Cyberbullying 2022

Nearly half of U.S. teens have been bullied or harassed online, with physical appearance being seen as a relatively common reason why. Older teen girls are especially likely to report being targeted by online abuse overall and because of their appearance

Table of contents.

  • Acknowledgments
  • Methodology

Pew Research Center conducted this study to better understand teens’ experiences with and views on bullying and harassment online. For this analysis, we surveyed 1,316 U.S. teens. The survey was conducted online by Ipsos from April 14 to May 4, 2022.

This research was reviewed and approved by an external institutional review board (IRB), Advarra, which is an independent committee of experts that specializes in helping to protect the rights of research participants.

Ipsos recruited the teens via their parents who were a part of its  KnowledgePanel , a probability-based web panel recruited primarily through national, random sampling of residential addresses. The survey is weighted to be representative of U.S. teens ages 13 to 17 who live with parents by age, gender, race, ethnicity, household income and other categories.

Here are the  questions used for this report , along with responses, and  its methodology .

While bullying existed long before the internet, the rise of smartphones and social media has brought a new and more public arena into play for this aggressive behavior.

cyberbullying research paper example

Nearly half of U.S. teens ages 13 to 17 (46%) report ever experiencing at least one of six cyberbullying behaviors asked about in a Pew Research Center survey conducted April 14-May 4, 2022. 1

The most commonly reported behavior in this survey is name-calling, with 32% of teens saying they have been called an offensive name online or on their cellphone. Smaller shares say they have had false rumors spread about them online (22%) or have been sent explicit images they didn’t ask for (17%).

Some 15% of teens say they have experienced someone other than a parent constantly asking them where they are, what they’re doing or who they’re with, while 10% say they have been physically threatened and 7% of teens say they have had explicit images of them shared without their consent.

In total, 28% of teens have experienced multiple types of cyberbullying.

Defining cyberbullying in this report

This report measures cyberbullying of teens using six distinct behaviors:

  • Offensive name-calling
  • Spreading of false rumors about them
  • Receiving explicit images they didn’t ask for
  • Physical threats
  • Constantly being asked where they are, what they’re doing, or who they’re with by someone other than a parent
  • Having explicit images of them shared without their consent

Teens who indicate they have personally experienced any of these behaviors online or while using their cellphone are considered targets of cyberbullying in this report. The terms “cyberbullying” and “online harassment” are used interchangeably throughout this report.

Age and gender are related to teens’ cyberbullying experiences, with older teen girls being especially likely to face this abuse

Teens’ experiences with online harassment vary by age. Some 49% of 15- to 17-year-olds have experienced at least one of the six online behaviors, compared with 42% of those ages 13 to 14. While similar shares of older and younger teens report being the target of name-calling or rumor spreading, older teens are more likely than their younger counterparts (22% vs. 11%) to say someone has sent them explicit images they didn’t ask for, an act sometimes referred to as cyberflashing ; had someone share explicit images of them without their consent, in what is also known as revenge porn (8% vs. 4%); or been the target of persistent questioning about their whereabouts and activities (17% vs. 12%).

A bar chart showing that older teen girls more likely than younger girls or boys of any age to have faced false rumor spreading, constant monitoring online, as well as cyberbullying overall

While there is no gender difference in having ever experienced online abuse, teen girls are more likely than teen boys to say false rumors have been spread about them. But further differences are seen when looking at age and gender together: 15- to 17-year-old girls stand out for being particularly likely to have faced any cyberbullying, compared with younger teen girls and teen boys of any age. Some 54% of girls ages 15 to 17 have experienced at least one of the six cyberbullying behaviors, while 44% of 15- to 17-year-old boys and 41% of boys and girls ages 13 to 14 say the same. These older teen girls are also more likely than younger teen girls and teen boys of any age to report being the target of false rumors and constant monitoring by someone other than a parent.

White, Black and Hispanic teens do not statistically differ in having ever been harassed online, but specific types of online attacks are more prevalent among certain groups. 2 For example, White teens are more likely to report being targeted by false rumors than Black teens. Hispanic teens are more likely than White or Black teens to say they have been asked constantly where they are, what they’re doing or who they’re with by someone other than a parent.

There are also differences by household income when it comes to physical threats. Teens who are from households making less than $30,000 annually are twice as likely as teens living in households making $75,000 or more a year to say they have been physically threatened online (16% vs. 8%).

A bar chart showing that older teen girls stand out for experiencing multiple types of cyberbullying behaviors

Beyond those differences related to specific harassing behaviors, older teen girls are particularly likely to say they experience multiple types of online harassment. Some 32% of teen girls have experienced two or more types of online harassment asked about in this survey, while 24% of teen boys say the same. And 15- to 17-year-olds are more likely than 13- to 14-year-olds to have been the target of multiple types of cyberbullying (32% vs. 22%).

These differences are largely driven by older teen girls: 38% of teen girls ages 15 to 17 have experienced at least two of the harassing behaviors asked about in this survey, while roughly a quarter of younger teen girls and teen boys of any age say the same.

Beyond demographic differences, being the target of these behaviors and facing multiple types of these behaviors also vary by the amount of time youth spend online. Teens who say they are online almost constantly are not only more likely to have ever been harassed online than those who report being online less often (53% vs 40%), but are also more likely to have faced multiple forms of online abuse (37% vs. 21%).

These are some of the findings from a Pew Research Center online survey of 1,316 U.S. teens conducted from April 14 to May 4, 2022.

Black teens are about twice as likely as Hispanic or White teens to say they think their race or ethnicity made them a target of online abuse

There are numerous reasons why a teen may be targeted with online abuse. This survey asked youth if they believed their physical appearance, gender, race or ethnicity, sexual orientation or political views were a factor in them being the target of abusive behavior online.

A bar chart showing that teens are more likely to think they've been harassed online because of the way they look than their politics

Teens are most likely to say their physical appearance made them the target of cyberbullying. Some 15% of all teens think they were cyberbullied because of their appearance.

About one-in-ten teens say they were targeted because of their gender (10%) or their race or ethnicity (9%). Teens less commonly report being harassed for their sexual orientation or their political views – just 5% each.

Looking at these numbers in a different way, 31% of teens who have personally experienced online harassment or bullying think they were targeted because of their physical appearance. About one-in-five cyberbullied teens say they were targeted due to their gender (22%) or their racial or ethnic background (20%). And roughly one-in-ten affected teens point to their sexual orientation (12%) or their political views (11%) as a reason why they were targeted with harassment or bullying online.

A bar chart showing that Black teens are more likely than those who are Hispanic or White to say they have been cyberbullied because of their race or ethnicity

The reasons teens cite for why they were targeted for cyberbullying are largely similar across major demographic groups, but there are a few key differences. For example, teen girls overall are more likely than teen boys to say they have been cyberbullied because of their physical appearance (17% vs. 11%) or their gender (14% vs. 6%). Older teens are also more likely to say they have been harassed online because of their appearance: 17% of 15- to 17-year-olds have experienced cyberbullying because of their physical appearance, compared with 11% of teens ages 13 to 14.

Older teen girls are particularly likely to think they have been harassed online because of their physical appearance: 21% of all 15- to 17-year-old girls think they have been targeted for this reason. This compares with about one-in-ten younger teen girls or teen boys, regardless of age, who think they have been cyberbullied because of their appearance.

A teen’s racial or ethnic background relates to whether they report having been targeted for cyberbullying because of race or ethnicity. Some 21% of Black teens report being made a target because of their race or ethnicity, compared with 11% of Hispanic teens and an even smaller share of White teens (4%).

There are no partisan differences in teens being targeted for their political views, with 5% of those who identify as either Democratic or Republican – including those who lean toward each party – saying they think their political views contributed to them being cyberbullied.

Black or Hispanic teens are more likely than White teens to say cyberbullying is a major problem for people their age

In addition to measuring teens’ own personal experiences with cyberbullying, the survey also sought to understand young people’s views about online harassment more generally.

cyberbullying research paper example

The vast majority of teens say online harassment and online bullying are a problem for people their age, with 53% saying they are a major problem. Just 6% of teens think they are not a problem.

Certain demographic groups stand out for how much of a problem they say cyberbullying is. Seven-in-ten Black teens and 62% of Hispanic teens say online harassment and bullying are a major problem for people their age, compared with 46% of White teens. Teens from households making under $75,000 a year are similarly inclined to call this type of harassment a major problem, with 62% making this claim, compared with 47% of teens from more affluent homes. Teen girls are also more likely than boys to view cyberbullying as a major problem.

Views also vary by community type. Some 65% of teens living in urban areas say online harassment and bullying are a major problem for people their age, compared with about half of suburban and rural teens.

Partisan differences appear as well: Six-in-ten Democratic teens say this is a major problem for people their age, compared with 44% of Republican teens saying this.

Roughly three-quarters of teens or more think elected officials and social media sites aren’t adequately addressing online abuse

In recent years, there have been several initiatives and programs aimed at curtailing bad behavior online, but teens by and large view some of those behind these efforts – including social media companies and politicians – in a decidedly negative light.

A bar chart showing that large majorities of teens think social media sites and elected officials are doing an only fair to poor job addressing online harassment

According to teens, parents are doing the best of the five groups asked about in terms of addressing online harassment and online bullying, with 66% of teens saying parents are doing at least a good job, including one-in-five saying it is an excellent job. Roughly four-in-ten teens report thinking teachers (40%) or law enforcement (37%) are doing a good or excellent job addressing online abuse. A quarter of teens say social media sites are doing at least a good job addressing online harassment and cyberbullying, and just 18% say the same of elected officials. In fact, 44% of teens say elected officials have done a poor job addressing online harassment and online bullying.

Teens who have been cyberbullied are more critical of how various groups have addressed online bullying than those who haven’t

cyberbullying research paper example

Teens who have experienced harassment or bullying online have a very different perspective on how various groups have been handling cyberbullying compared with those who have not faced this type of abuse. Some 53% of teens who have been cyberbullied say elected officials have done a poor job when it comes to addressing online harassment and online bullying, while 38% who have not undergone these experiences say the same (a 15 percentage point gap). Double-digit differences also appear between teens who have and have not been cyberbullied in their views on how law enforcement, social media sites and teachers have addressed online abuse, with teens who have been harassed or bullied online being more critical of each of these three groups. These harassed teens are also twice as likely as their peers who report no abuse to say parents have done a poor job of combatting online harassment and bullying.

Aside from these differences based on personal experience with cyberbullying, only a few differences are seen across major demographic groups. For example, Black teens express greater cynicism than White teens about how law enforcement has fared in this space: 33% of Black teens say law enforcement is doing a poor job when it comes to addressing online harassment and online bullying; 21% of White teens say the same. Hispanic teens (25%) do not differ from either group on this question.

Large majorities of teens believe permanent bans from social media and criminal charges can help reduce harassment on the platforms

Teens have varying views about possible actions that could help to curb the amount of online harassment youth encounter on social media.

A bar chart showing that half of teens think banning users who bully or criminal charges against them would help a lot in reducing the cyberbullying teens may face on social media

While a majority of teens say each of five possible solutions asked about in the survey would at least help a little, certain measures are viewed as being more effective than others.

Teens see the most benefit in criminal charges for users who bully or harass on social media or permanently locking these users out of their account. Half of teens say each of these options would help a lot in reducing the amount of harassment and bullying teens may face on social media sites.

About four-in-ten teens think that if social media companies looked for and deleted posts they think are bullying or harassing (42%) or if users of these platforms were required to use their real names and pictures (37%) it would help a lot in addressing these issues. The idea of forcing people to use their real name while online has long existed and been heavily debated: Proponents see it as a way to hold bad actors accountable and keep online conversations more civil , while detractors believe it would do little to solve harassment and could even  worsen it .

Three-in-ten teens say school districts monitoring students’ social media activity for bullying or harassment would help a lot. Some school districts already use digital monitoring software to help them identify worrying student behavior on school-owned devices , social media and other online platforms . However, these programs have been met with criticism regarding privacy issues , mixed results and whether they do more harm than good .

A chart showing that Black or Hispanic teens more optimistic than White teens about the effectiveness of five potential solutions to curb online abuse

Having personally experienced online harassment is unrelated to a teen’s view on whether these potential measures would help a lot in reducing these types of adverse experiences on social media. Views do vary widely by a teen’s racial or ethnic background, however.

Black or Hispanic teens are consistently more optimistic than White teens about the effectiveness of each of these measures.

Majorities of both Black and Hispanic teens say permanently locking users out of their account if they bully or harass others or criminal charges for users who bully or harass on social media would help a lot, while about four-in-ten White teens express each view.

In the case of permanent bans, Black teens further stand out from their Hispanic peers: Seven-in-ten say this would help a lot, followed by 59% of Hispanic teens and 42% of White teens.

  • It is important to note that there are various ways researchers measure youths’ experiences with cyberbullying and online harassment. As a result, there may be a range of estimates for how many teens report having these experiences. In addition, since the Center last polled on this topic in 2018, there have been changes in how the surveys were conducted and how the questions were asked. For instance, the 2018 survey asked about bullying by listing a number of possible behaviors and asking respondents to “check all that apply.” This survey asked teens to answer “yes” or “no” to each item individually. Due to these changes, direct comparisons cannot be made across the two surveys. ↩
  • There were not enough Asian American teen respondents in the sample to be broken out into a separate analysis. As always, their responses are incorporated into the general population figures throughout the report. ↩

Sign up for our weekly newsletter

Fresh data delivery Saturday mornings

Sign up for The Briefing

Weekly updates on the world of news & information

  • Online Harassment & Bullying
  • Teens & Tech
  • Teens & Youth

Teens and Video Games Today

How teens and parents approach screen time, teens, social media and technology 2023, teens and social media: key findings from pew research center surveys, gun deaths among u.s. children and teens rose 50% in two years, most popular, report materials.

901 E St. NW, Suite 300 Washington, DC 20004 USA (+1) 202-419-4300 | Main (+1) 202-857-8562 | Fax (+1) 202-419-4372 |  Media Inquiries

Research Topics

  • Email Newsletters

ABOUT PEW RESEARCH CENTER  Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of  The Pew Charitable Trusts .

© 2024 Pew Research Center

IMAGES

  1. Cyberbullying essay sample (400 Words)

    cyberbullying research paper example

  2. (PDF) Cyberbullying: A Sociological Approach

    cyberbullying research paper example

  3. 006 Essay On Cyber Bullying Cyberbullying Thatsnotus

    cyberbullying research paper example

  4. (PDF) Cyberbullying in the World of Teenagers and Social Media:: A

    cyberbullying research paper example

  5. Position Paper Sample About Cyber Bullying Bestseller

    cyberbullying research paper example

  6. Research Paper

    cyberbullying research paper example

VIDEO

  1. example of cyberbullying

  2. Tackling the growing scourge of cyberbullying

  3. Cyberbullying and young women

  4. Expanding perspectives on cyberbullying

  5. Cyber Bullying Essay In English

  6. SELF-ESTEEM, ACADEMIC STRESS, AND EXPOSURE TO CYBERBULLYING: A CORRELATIONAL

COMMENTS

  1. Cyberbullying Among Adolescents and Children: A Comprehensive Review of the Global Situation, Risk Factors, and Preventive Measures

    More research on cyberbullying is needed, especially on the issue of cross-national cyberbullying. International cooperation, multi-pronged and systematic approaches are highly encouraged to deal with cyberbullying. ... We extracted information relating to individual papers and sample characteristics, including authors, year of publication ...

  2. (PDF) Cyberbullying: A Review of the Literature

    cyberbullying, in which individuals or groups of individuals use the media to inflict emotional distress on. other individuals (Bocij 2004). According to a rece nt study of 743 teenager s and ...

  3. (PDF) An Introduction in Cyberbullying Research

    entitled 'New bottle but old wine: A research of cyberbullying in schools', shows that 54% of. the 177 seventh grade students in Canada had been bullied offline, and 25% had been bullied ...

  4. Current perspectives: the impact of cyberbullying on adolescent health

    This paper reviews the current literature related to the effects of cyberbullying on adolescent health across multiple studies worldwide and provides directions for future research. ... This has implications for involvement in subsequent cyberbullying. For example, research has demonstrated that owning a "Smartphone" in elementary school ...

  5. Full article: The Effect of Social, Verbal, Physical, and Cyberbullying

    Introduction. Research on bullying victimization in schools has developed into a robust body of literature since the early 1970s. Formally defined by Olweus (Citation 1994), "a student is being bullied or victimized when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other students and where a power imbalance exists" (p. 1173).

  6. PDF Cyberbullying: A Review of the Literature

    A review of literature is provided and results and analysis of the survey are discussed as well as recommendations for future research. Erdur-Baker's (2010) study revealed that 32% of the students were victims of both cyberbullying and traditional bullying, while 26% of the students bullied others in both cyberspace and physical environments ...

  7. Cyberbullying Among Young Adults: Effects on Mental and Physical Health

    papers reviewed, rates of cybervictimization varied widely from 7% in one study (Ybarra, 2004) ... composition of the sample, the way cyberbullying was defined, and retrospective time frame of cyberbullying (Patchin & Hinduja, 2012). ... bullying research, is a lack of a standardized, agreed upon definition of the phenomena. With these

  8. PDF Recommendations for Cyberbullying Prevention Methods: Offline and

    This paper explains the role that parents, schools, and young people play in preventing cyberbullying. Research that explains the importance of a combination of efforts will be utilized, as multiple sources agree that preventing cyberbullying is a result of multidisciplinary teams that work together to address the issue (Mehari et al., 2018).

  9. Cyberbullying: next‐generation research

    Cyberbullying: next‐generation research. Cyberbullying, or the repetitive aggression carried out over elec­tronic platforms with an intent to harm, is probably as old as the Internet itself. Research interest in this behavior, variably named, is also relatively old, with the first publication on "cyberstalking" ap­pearing in the PubMed ...

  10. Cyberbullying on social networking sites: A literature review and

    1. Introduction. Cyberbullying is an emerging societal issue in the digital era [1, 2].The Cyberbullying Research Centre [3] conducted a nationwide survey of 5700 adolescents in the US and found that 33.8 % of the respondents had been cyberbullied and 11.5 % had cyberbullied others.While cyberbullying occurs in different online channels and platforms, social networking sites (SNSs) are fertile ...

  11. Qualitative Methods in School Bullying and Cyberbullying Research: An

    School bullying research has a long history, stretching all the way back to a questionnaire study undertaken in the USA in the late 1800s (Burk, 1897).However, systematic school bullying research began in earnest in Scandinavia in the early 1970s with the work of Heinemann and Olweus ().Highlighting the extent to which research on bullying has grown exponentially since then, Smith et al. found ...

  12. Full article: Current perspectives: the impact of cyberbullying on

    This paper reviews the current literature related to the effects of cyberbullying on adolescent health across multiple studies worldwide and provides directions for future research. ... This has implications for involvement in subsequent cyberbullying. For example, research has demonstrated that owning a "Smartphone" in elementary school ...

  13. A Review on Deep-Learning-Based Cyberbullying Detection

    Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying detection is a pressing need in today's world, as the prevalence of cyberbullying is continually growing, resulting in mental health issues ...

  14. Understanding Bullying and Cyberbullying Through an ...

    Recognized as complex and relational, researchers endorse a systems/social-ecological framework in examining bullying and cyberbullying. According to this framework, bullying and cyberbullying are examined across the nested social contexts in which youth live—encompassing individual features; relationships including family, peers, and educators; and ecological conditions such as digital ...

  15. (PDF) Cyberbullying Prevention and Reduction Strategies ...

    Cyberbullying on social networking sites is an emerging societal issue that has drawn significant scholarly attention. The purpose of this study is to consolidate the existing knowledge through a ...

  16. Full article: Bullying and cyberbullying: a bibliometric analysis of

    Introduction. Bullying has been considered "one of the most outstanding topics in educational research" (Espinosa, Citation 2018), a public health problem among children and adolescents (Chester et al., Citation 2015), and also a reason for concern in schools and communities (Bradshaw, Citation 2015).According to the PISA 2018 report, on average, 23% of students reported being bullied at ...

  17. PDF Cyberbullying: Resources for Intervention and Prevention

    cyberbullying. It concluded that experience with cyberbullying has a more negative effect on adolescent development than traditional bullying, and victims may suffer long term sociological and psychological consequences. Although cyberbullying does not involve personal contact between an offender and a victim, it can

  18. Frontiers

    More research on cyberbullying is needed, especially on the issue of cross-national cyberbullying. International cooperation, multi-pronged and systematic approaches are highly encouraged to deal with cyberbullying. ... We extracted information relating to individual papers and sample characteristics, including authors, year of publication ...

  19. PDF CYBER BULLYING AND ACADEMIC PERFORMANCE

    Bullying is a form of peer aggression which can be as damaging as any form of conventional aggression (Mickie, 2011). The problem investigated in this research concerns cyber bullying that disturbs university students psychologically and emotionally. Bullying also prevents students from achieving good grades.

  20. (PDF) Cyberbullying in the World of Teenagers and Social ...

    The increased use of social media by teenagers, has led to cyberbullying becoming a major issue. Cyberbullying is the use of information and communication technology to harass and harm in a ...

  21. PDF The Impact of School Bullying On Students' Academic Achievement from

    The research sample consisted of all schools' teachers in Amman West Area (in Jordan). The sample size consisted of 200 teachers selected from different schools from Amman West area in Jordan. A self-administrated questionnaire was designed according to research objectives and hypotheses and distributed over research sample subjects. All

  22. Teens and Cyberbullying 2022

    Some 32% of teen girls have experienced two or more types of online harassment asked about in this survey, while 24% of teen boys say the same. And 15- to 17-year-olds are more likely than 13- to 14-year-olds to have been the target of multiple types of cyberbullying (32% vs. 22%). These differences are largely driven by older teen girls: 38% ...

  23. Senior High School Students Cyberbullying Experience: A Case of

    This paper aims to understand the sentiments of students on cyber. bullying experience in a university in the Philippines. 2. LITERATURE REVIEW. Cyber-bullying is a negative act of the user using ...