International Journal of Academic Research in Business and Social Sciences

search-icon

Revalidating Adolescent Cyber-Bullying Scale Using Fuzzy Delphi Approach

Open access

Zaidatul Nadiah Abu Yazid, Azeni Abu Bakar, Jolin Norshyme Hashim, Nurul Nadia Abd Aziz

Pages 809-818 Received: 04 Jul, 2022 Revised: 07 Aug, 2022 Published Online: 10 Sep, 2022

http://dx.doi.org/10.46886/IJARBSS/v12-i9/12162
The purpose of this study is to use the Fuzzy Delphi Approach to obtain expert consensus on the effects of the cyberbully aggressor scale in the context of Malaysia. The purposive sampling method was used to select ten experts for this study. The experts were selected from a variety of educational levels and expertise areas. Most of them have 7 to 29 years of experience in interacting using ICT. For the purpose of revalidation, a revised version of The Cyber-Aggressor Scale (CYB-AGG) was used in this study. The study's findings revealed that there was a strong degree of agreement among experts because the average threshold value for the entire construct reached was 0.07474. The experts generally accepted most of the items, as evidenced by the total expert agreement percentage of 93%. The revalidation of this scale is a significant contribution of this study that may be useful for policymakers to develop more effective prevention programs in minimizing cyberbullying.
Adler, M., & Ziglio, E. (1996). Gazing into the Oracle: The Delphi method and its application to social policy and public health: Jessica Kingsley Publisher
Anis, N., Rahim, A., & Lim, Y. (2012)?Najib: Cyber bullying a serious threat to kids. The Star Online. Retrieved from
https://www.thestar.com.my/news/nation/2012/10/10/najib-cyber-bullying-a-serious-threat-to-kids/#sxK4CmmdUr50tcw2.99 on 28th August 2022
Balakrishnan, V. (2015). Cyberbullying among young adults in Malaysia: The roles of gender, age and Internet frequency. Computers in Human Behavior, Volume 46, Pages 149-157, https://doi.org/10.1016/j.chb.2015.01.021.
Berliner, D. (2004). Describing the Behavior and Documenting the Accomplishments of Expert Teachers. Bulletin of Science, Technology & Society. 24. 200-212.
10.1177/0270467604265535.
Booker, J. M., & McNamara, L. a. (2004). Solving Black Box Computation Problems Using Expert Knowledge Theory and Methods. Reliability Engineering & System Safety, 85(1–3), 331–340.
Bodjanova, S. (2006). Median Alpha-Levels of A Fuzzy Number. Fuzzy Sets and Systems, 157(7), 879–891. doi: 10.1016/j.fss.2005.10.015
Buelga, S., Postigo, J., Martinez-Ferrer, B., Cava, M. J., & Ortega-Baron, J. (2020). Cyberbullying among adolescents: Psychometric properties of the CYB-AGS cyber-aggressor Scale. International Journal of Environmental Research and Public Health, 17(9), 3090.
Cantrill, J. A., Sibbald, B., & Buetow, S. (1996). The Delphi And Nominal Group Techniques in Health Services Research. International Journal of Pharmacy Practice, 4(2), 67–74.
Chang, P. C., & Wang, Y. W. (2006). Fuzzy Delphi and back-propagation model for sales forecasting in PCB industry. Expert systems with applications, 30(4), 715-726.
Chang, P.-L., Hsu, C.-W., & Chang, P.-C. (2011). Fuzzy Delphi Method for Evaluating Hydrogen Production Technologies. International Journal of Hydrogen Energy, 36(21), 14172–14179. doi: 10.1016/j.ijhydene.2011.05.045
Cheng, C. H., & Lin, Y. (2002). Evaluating the Best Main Battle Tank Using Fuzzy Decision Theory with Linguistic Criteria Evaluation. European journal of operational research, 142(1), 174-186.
Farezza, H. R. (2017). Cyberbullying among top five online threats. New Strait Times (Online). Retrieved from https://www.nst.com.my/news/exclusive/2017/05/236873/cyberbullying-among-top-five-online-threats on 28th August 2022.
Gambatese, J., Behm, M., & Rajendran, S. (2008). Design’s role in construction accident causality and prevention: Perspectives from an expert panel. Safety Science. 46. 675-691. 10.1016/j.ssci.2007.06.010.
Hasson, F., Keeney, S., & McKenna, H. (2000). Research guidelines for the Delphi survey technique. Journal of Advanced Nursing. https://doi.org/10.1046/j.1365-2648.2000.t01-1-01567.x
Hsieh, T. Y., Lu, S. T., & Tzeng, G. H. (2004). Fuzzy MCDM Approach for Planning and Design Tenders Selection in Public Office Buildings. International Journal of Project Management. https://doi.org/10.1016/j.ijproman.2004.01.002
Jones, H., & Twiss B. L. (1978). Forecasting technology for planning decisions. New York: Macmillan.
Kamarulzaman, S. F., & Alsibai, M. H. (2018). Time-Change-Fuzzy-Based Intelligent Vehicle Control System for Safe Emergency Lane Transition During Driver Lethargic State. Advanced Science Letters. Vol 24(10), 7554-7558(5).
https://doi.org/10.1166/asl.2018.12977
Kee, D. M. H., Al?Anesi, M. A. L., Al?Anesi, S. A. L. (2022). Cyberbullying on Social Media Under the Influence of COVID?19. Global Business and Organizational Excellence. 6:10.1002/joe.22175. doi: 10.1002/joe.22175. PMCID: PMC9350190.
Malaysia Communications and Multimedia Commission. (2018). Internet Users Survey 2018: Statistical Brief Number Twenty-Three.
Yusoff, M. A. F., Hashim, A., Muhamad, N., & Hamat, W. N. (2021). Application of fuzzy delphi technique to identify the elements for designing and developing the e-PBM PI-Poli module. Asian Journal of University Education (AJUE), 7(1), 292-304.
Molero, M. M., Martos, A., Barragan, A. B., Perez-Fuentes, M. C., & Gazquez., J. J. (2022). Anxiety and depression from cybervictimization in adolescents: A metaanalysis and meta-regression study. The European Journal of Psychology Applied to Legal Context. 14(1), 42-50.
Mullen, P. M. (2003). Delphi: myths and reality. Journal of Health Organization and Management. Vol. 17 No. 1, pp. 37-52. https://doi.org/10.1108/14777260310469319
Nikolopoulos, K. (2004). Elicitation of expert opinions for uncertainty and risk. International Journal of Forecasting (Vol. 20).
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148-169
Perera, A. H., Drew, C. A., & Johnson, C. J. (2012). Expert Knowledge and Its Application in Landscape Ecology. Springer, New York, 1–11. http://doi.org/10.1007/978-1-4614-1034-8
Tang, C. W., & Wu, C. T. (2010). Obtaining a Picture of Undergraduate Education Quality: A Voice From Inside the University. Higher Education (60), 269-286
Tang, C. W., & Wu, C. T. (2010). Obtaining a Picture of Undergraduate Education Quality: A Voice From Inside the University. Higher Education (60), 269-286
Tang, C. W., & Wu, C.T. (2010). Obtaining a Picture of Undergraduate Education Quality: A Voice from Inside the University. Higher Education (60), 269-286
Thomas, J. (2019). Children and social media. Retrieved from https://theaseanpost. com/article/children-and-social-media on 29th August 2022.
UNICEF East Asia and the Pacific Regional Office and the Centre for Justice and Crime Prevention. (2020) Our Lives Online: Use of social media by children and adolescents in East Asia - opportunities, risks and harms. UNICEF, Bangkok.
In-Text Citation: (Yazid et al., 2022)
To Cite this Article: Yazid, Z. N. A., Bakar, A. A., Hashim, J. N., & Aziz, N. N. A. (2022). Revalidating Adolescent Cyber-Bullying Scale Using Fuzzy Delphi Approach. International Journal of Academic Research in Business and Social Sciences, 12(9), 809– 818.