Criminology Project Topics

Epidemiology of Cyber Victimization Among Urban University Student in Ekiti State

Epidemiology of Cyber Victimization Among Urban University Student in Ekiti State

Epidemiology of Cyber Victimization Among Urban University Student in Ekiti State

CHAPTER ONE

Objective of the study

  1. To assess the frequency and incidence of various forms of cyber victimization experienced by urban university students in Ekiti State.
  2. To analyze the different manifestations of cyber victimization within the urban university context in Ekiti State.
  3. Investigate how sociodemographic factors such as gender, age, socioeconomic status, and cultural background may influence the likelihood and nature of cyber victimization among urban university students in Ekiti State.

CHAPTER TWO

REVIEWED OF RELATED LITERATURE

Theoretical framework: Cyber bullying and victimization

Hinduja and Patchin (2008) defined cyber bullying as damaging behavior conducted deliberately and repetitively through electronic texts, whereas Cénat et al. (2021) pertains to cyber victimization as being intentionally harmed by others through communication technologies. Shariff (2005), who described cyber bullying as a covert form of bullying through communication, stated that cyber bullying has three main features: • Anonymity (being able to hide the identity of the bully); • Large numbers of people can participate in bullying; • Frequent involvement of sexual harassment. Various studies have focused on cyber bullying as it poses risks to individuals from all age groups. Such studies have revealed that cyber bullying and victimization range between 1.2% and 58% and between 1% and 68%, respectively, in terms of frequency (Leung et al., 2018; Kowalski et al., 2019). Although the findings in the literature regarding the prevalence of cyber bullying by gender are inconsistent, one of the frequent conclusions is that males are more likely to conduct cyber bullying (Qudah et al., 2019), whereas females are more likely to experience cyber victimization (Heiman & Olenik-Shemesh, 2015). Behaviors related to cyber bullying lead to serious psychological, social, and emotional impacts on victims. Being a victim in the virtual environment can result in low levels of self-esteem, depression, anxiety, and loneliness (Beran & Li, 2005; Hinduja & Patchin, 2009). Furthermore, the negative effects of cyber bullying are not only limited to the psychological and emotional dimensions but can also lead to behavioral changes in victims. Various studies indicate that cyber victims incur more absences in school (Bauman & Newman, 2013), use more alcohol and cigarette (Mesch, 2009), drop out and bring guns to school (Ybarra et al., 2007), and commit suicide (Kirby, 2008). Moreover, not only victims but also individuals who engage in cyber bullying and witness such incidents can face negative consequences (Kalender et al., 2019). As in the current study, in studies investigating cyberbullying among Turkish university students, Akbulut and Eristi (2011) concluded that males do more cyberbullying. Turan et al. (2011) found that 59.8% of university students were exposed to cyberbullying.

 

CHAPTER THREE

RESEARCH METHODOLOGY

INTRODUCTION

In this chapter, we described the research procedure for this study. A research methodology is a research process adopted or employed to systematically and scientifically present the results of a study to the research audience viz. a vis, the study beneficiaries.

RESEARCH DESIGN

Research designs are perceived to be an overall strategy adopted by the researcher whereby different components of the study are integrated in a logical manner to effectively address a research problem. In this study, the researcher employed the survey research design. This is due to the nature of the study whereby the opinion and views of people are sampled. According to Singleton & Straits, (2009), Survey research can use quantitative research strategies (e.g., using questionnaires with numerically rated items), qualitative research strategies (e.g., using open-ended questions), or both strategies (i.e., mixed methods). As it is often used to describe and explore human behaviour, surveys are therefore frequently used in social and psychological research.

CHAPTER FOUR

DATA PRESENTATION AND ANALYSIS

INTRODUCTION

This chapter presents the analysis of data derived through the questionnaire and key informant interview administered on the respondents in the study area. The analysis and interpretation were derived from the findings of the study. The data analysis depicts the simple frequency and percentage of the respondents as well as interpretation of the information gathered. A total of eighty (80) questionnaires were administered to respondents of which only seventy-seven (77) were returned and validated. This was due to irregular, incomplete and inappropriate responses to some questionnaire. For this study a total of 77 was validated for the analysis.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

Introduction

It is important to ascertain that the objective of this study was to ascertain epidemiology of cyber victimization among urban University student in Ekiti state. In the preceding chapter, the relevant data collected for this study were presented, critically analyzed and appropriate interpretation given. In this chapter, certain recommendations made which in the opinion of the researcher will be of benefits in addressing an epidemiology of cyber victimization among urban University student in Ekiti state

Summary

This study was on epidemiology of cyber victimization among urban University student in Ekiti state. Three objectives were raised which included:  To assess the frequency and incidence of various forms of cyber victimization experienced by urban university students in Ekiti State, to analyze the different manifestations of cyber victimization within the urban university context in Ekiti State and investigate how sociodemographic factors such as gender, age, socioeconomic status, and cultural background may influence the likelihood and nature of cyber victimization among urban university students in Ekiti State. A total of 77 responses were received and validated from the enrolled participants where all respondents were drawn from selected students from university of Ekiti state. Hypothesis was tested using Chi-Square statistical tool (SPSS).

 Conclusion   

The epidemiological study on cyber victimization among urban university students in Ekiti State has provided valuable insights into the prevalence, patterns, and contributing factors of this emerging issue within the academic community. Through a comprehensive examination of survey data, interviews, and relevant literature, the research aimed to enhance our understanding of the scope and nature of cyber victimization in this specific population.

The findings of the study revealed a concerning prevalence of cyber victimization among urban university students in Ekiti State. Various forms of online harassment, including cyberbullying, online stalking, and unauthorized dissemination of personal information, were identified as significant challenges faced by students. The omnipresence of digital technologies and social media platforms has created new avenues for perpetrating harm, often blurring the lines between the virtual and physical realms.

Recommendation

Integrate comprehensive cyber safety education programs into the university curriculum to enhance students’ digital literacy and equip them with the skills to navigate online spaces responsibly.

Launch awareness campaigns emphasizing responsible social media use, including guidelines on privacy settings, secure online behavior, and the potential consequences of sharing sensitive information online.

Develop and widely publicize clear reporting mechanisms for cyber victimization incidents. This should include anonymous reporting options to encourage students to come forward without fear of retaliation.

Establish partnerships with local law enforcement agencies to address severe cases of cyber victimization. This collaboration can enhance the legal response to online harassment and ensure a coordinated effort to investigate and prosecute offenders.

 

References

  • Agyemang, Nana K. 2014. “Review Ban on Use of Mobile Phone.” Graphic Online. Retrieved December 27, 2016. (http://www.graphic.com.gh/news/education/review-ban-on-use-of-mobile-phones.html).
  • Andersson, Lynne M and Christine M Pearson. 1999. “Tit for Tat? the Spiraling Effect of Incivility in the Workplace.” Academy of Management Review 24 (3):452–71.
  •  Antiri, Kwasi O. 2016.“Types of Bullying in the Senior High Schools in Ghana.” Journal of Education and Practice 7:131–38.
  •  Archer, John, Jane L Ireland, and Christina L Power. 2007. “Differences between Bullies and Victims, and Men and Women, on Aggression-Related Variables among Prisoners.” British Journal of Social Psychology 46:299–322. doi: 10.1348/014466606X114083.
  •  Bardi, Anat and Shalom H Schwartz. 2003. “Values and Behavior: Strength and Structure of Relations.” Personality and Social Psychology Bulletin 29 (10):1207–20. doi: 10.1177/0146167203254602.
  •  Barker, Edward D., Louise Arseneault, Mara Brendgen, Nathalie Fontaine, and Barbara Maughan. 2008. “Joint Development of Bullying and Victimization in Adolescence: Relations to Delinquency and Self-Harm.” Journal of the American Academy of Child & Adolescent Psychiatry 47 (9):1030–38.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!