Development and Validation of ICT Self-Efficacy Scale: Exploring the Relationship with Cyberbullying and Victimization
Abstract
:1. Introduction
2. Study 1: Development of ICT Self-Efficacy Scale and Exploratory Phase
2.1. Content Validity
2.2. Exploratory Factor Structure (EFA)
3. Materials and Methods
3.1. Sample
3.2. Measure
3.3. Procedure
4. Results
5. Study 2: Confirmatory Phase
6. Materials and Methods
6.1. Sample
6.2. Measures
6.2.1. General Self-Efficacy Scale (GSES)
6.2.2. ICT Use Scale
6.2.3. Time Spent on the Internet
6.2.4. Cyberbullying and Cyber Victimization Scales
7. Results
8. Discussion
8.1. Limitations and Future Directions
8.2. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Musharraf, S.; Anis-ul-Haque, M. Impact of cyber aggression and cyber victimization on mental health and well-being of Pakistani young adults: The moderating role of gender. J. Aggress. Maltreatment Trauma 2018, 27, 942–958. [Google Scholar] [CrossRef]
- Bateman, D.; Willems, J. Facing off: Facebook and higher education, in Misbehavior online in higher education. In Cutting-edge Technologies in Higher Education; Wankel, L.A., Wankel, C., Eds.; Emerald Group Publishing Limited: Bingley, UK, 2012; pp. 53–77. [Google Scholar]
- Musharraf, S.; Anis-ul-Haque, M. Cyberbullying in different participant roles: Exploring differences in psychopathology and well-being in university students. Pak. J. Med. Res. 2018b, 57, 33–39. [Google Scholar]
- Musharraf, S.; Lewis, C.A. Cyberbullying—Bullying in the virtual world: A cautionary note for medical educators. J. Pak. Psych. Soc. 2016, 13, 35–36. [Google Scholar]
- Tokunaga, R.S. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Comput. Hum. Behav. 2010, 26, 277–287. [Google Scholar] [CrossRef]
- Kowalski, R.M.; Giumetti, G.W.; Schroeder, A.N.; Lattanner, M.R. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychol. Bull. 2014, 140, 1073–1137. [Google Scholar] [CrossRef] [PubMed]
- Olweus, D. School bullying: Development and some important challenges. Annu. Rev. Clin. Psychol. 2013, 9, 751–780. [Google Scholar] [CrossRef]
- Li, Q.; Cross, D.; Smith, P.K. Research into cyberbullying context. In Cyberbullying in the Global Playground: Research from International Perspectives; Li, Q., Cross, D., Smith, P.K., Eds.; John Wiley & Sons: Sussex, UK, 2011; pp. 3–12. [Google Scholar]
- Ybarra, M.L.; Espelage, D.L.; Mitchell, K.J. Differentiating youth who are bullied from other victims of peer-aggression: The importance of differential power and repetition. J. Adolesc. Health 2014, 55, 293–300. [Google Scholar] [CrossRef] [PubMed]
- Monks, C.P.; Smith, P.K. Definitions of bullying: Age differences in understanding of the term, and the role of experience. Br. J. Dev. Psychol. 2006, 24, 801–821. [Google Scholar] [CrossRef]
- Dooley, J.J.; Pyżalski, J.; Cross, D. Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. J. Psychol. 2009, 217, 182–188. [Google Scholar] [CrossRef]
- Barlett, C.P.; Prot, S.; Anderson, C.A.; Gentile, D.A. An empirical examination of the strength differential hypothesis in cyberbullying behavior. Psychol. Violence 2017, 7, 22–32. [Google Scholar] [CrossRef]
- Livingstone, S.; Haddon, L.; Gorzig, A.; Ólafsson, K. Risks and Safety on the Internet: The Perspective of European Children; Full Findings; EU Kids Online: London, UK, 2011. [Google Scholar]
- Vandebosch, H.; Van Cleemput, K. Cyberbullying among youngsters: Profiles of bullies and victims. New Media Soc. 2009, 11, 1349–1371. [Google Scholar] [CrossRef]
- Walrave, M.; Heirman, W. Cyberbullying: Predicting Victimisation and Perpetration. Child. Soc. 2011, 25, 59–72. [Google Scholar] [CrossRef]
- Chen, L.; Ho, S.S.; Lwin, M.O. A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media Soc. 2016, 19, 1194–1213. [Google Scholar] [CrossRef]
- Zhou, Z.; Tang, H.; Tian, Y.; Wei, H.; Zhang, F.; Morrison, C.M. Cyberbullying and its risk factors among Chinese high school students. Sch. Psychol. Int. 2013, 34, 630–647. [Google Scholar] [CrossRef]
- Navarro, J.N.; Clevenger, S.; Beasley, M.E.; Jackson, L.K. One step forward, two steps back: Cyberbullying within social networking sites. Secur. J. 2017, 30, 844–858. [Google Scholar] [CrossRef]
- Bandura, A. Self-Efficacy: The Exercise of Control; Freedom and Company: New York, NY, USA, 1997; ISBN 0716728508. [Google Scholar]
- Bandura, A. Self-Efficacy: Toward a unifying theory of behavioral change. Psychol. Rev. 1977, 84, 191–215. [Google Scholar] [CrossRef]
- Bandura, A. Social Foundations of Thought and Action: A Social Cognitive Theory; Prentice Hall: Englewood Cliffs, NJ, USA, 1986; ISBN 9780138156145. [Google Scholar]
- Wong, D.S.; Chan, H.C.O.; Cheng, C.H. Cyberbullying perpetration and victimization among adolescents in Hong Kong. Child. Youth Serv. Rev. 2014, 36, 133–140. [Google Scholar] [CrossRef]
- Eden, S.; Heiman, T.; Olenik-Shemesh, D. Bully versus victim on the Internet: The correlation with emotional-social characteristics. Educ. Inf. Technol. 2016, 21, 699–713. [Google Scholar] [CrossRef]
- Natvig, G.K.; Albrektsen, G.; Qvarnstrom, U. School-related stress experience as a risk factor for bullying behavior. J. Youth Adolesc. 2001, 30, 561–575. [Google Scholar] [CrossRef]
- Kokkinos, C.M.; Kipritsi, E. The relationship between bullying, victimization, trait emotional intelligence, self-efficacy and empathy among preadolescents. Soc. Psychol. Educ. 2012, 15, 41–58. [Google Scholar] [CrossRef]
- Olenik-Shemesh, D.; Heiman, T. Exploring Cyberbullying among primary children in relation to social support, loneliness, self-efficacy, and well-being. Child Welf. 2014, 93, 27–46. [Google Scholar]
- Bussey, K.; Fitzpatrick, S.; Raman, A. The Role of Moral Disengagement and Self-Efficacy in Cyberbullying. J. Sch. Violence 2015, 14, 30–46. [Google Scholar] [CrossRef]
- Savage, M.W.; Tokunaga, R.S. Moving toward a theory: Testing an integrated model of cyberbullying perpetration, aggression, social skills, and Internet self-efficacy. Comput. Hum. Behav. 2017, 71, 353–361. [Google Scholar] [CrossRef]
- Yanagida, T.; Gradinger, P.; Strohmeier, D.; Solomontos-Kountouri, O.; Trip, S.; Bora, C. Cross-national prevalence of traditional bullying, traditional victimization, cyberbullying and cyber-victimization: Comparing single-item and multiple-item approaches of measurement. Int. J. Dev. Sci. 2016, 10, 21–32. [Google Scholar] [CrossRef]
- Eastin, M.S.; LaRose, R. Internet self-efficacy and the psychology of the digital divide. J. Comput. Mediat. Commun. 2000, 6, JCMC611. [Google Scholar] [CrossRef]
- Torkzadeh, G.; Van Dyke, T.P. Development and validation of an Internet self-efficacy scale. Behav. Inf. Technol. 2001, 20, 275–280. [Google Scholar] [CrossRef]
- Tsai, M.J.; Tsai, C.C. Information searching strategies in web-based science learning: The role of Internet self-efficacy. Innov. Educ. Teach. Int. 2003, 40, 43–50. [Google Scholar] [CrossRef]
- Betts, L. Cyberbullying: Approaches, Consequences and Interventions; Palgrave Macmillan: London, UK, 2016; ISBN 978-1-137-50009-0. [Google Scholar]
- Kowalski, R.M.; Limber, S.P. Electronic bullying among middle school students. J. Adolesc. Health 2007, 41, S22–S30. [Google Scholar] [CrossRef]
- Katzer, C.; Fetchenhauer, D.; Belschak, F. Cyberbullying: Who are the victims? A comparison of victimization in Internet chatrooms and victimization in school. J. Media Psychol. 2009, 21, 25–36. [Google Scholar] [CrossRef]
- Whittaker, E.; Kowalski, R.M. Cyberbullying Via Social Media. J. Sch. Violence 2014, 14, 11–29. [Google Scholar] [CrossRef]
- Kim, Y.; Glassman, M. Beyond search and communication: Development and validation of the Internet Self-Efficacy Scale (ISS). Comput. Hum. Behav. 2013, 29, 1421–1429. [Google Scholar] [CrossRef]
- Chuang, S.C.; Lin, F.M.; Tsai, C.C. An exploration of the relationship between Internet self-efficacy and sources of Internet self-efficacy among Taiwanese university students. Comput. Hum. Behav. 2015, 48, 147–155. [Google Scholar] [CrossRef]
- Demir, Ö.; Yurdugül, H. The examination of prospective teachers’ information and communication technology usage and online communication self-efficacy levels in Turkey. Procedia Soc. Behav. Sci. 2015, 176, 371–377. [Google Scholar] [CrossRef]
- Wood, R.E.; Locke, E.A. The relation of self-efficacy and grade goals to academic performance. Educ. Psychol. Meas. 1987, 47, 1013–1024. [Google Scholar] [CrossRef]
- Maibach, E.; Murphy, D.A. Self-Efficacy in health promotion research and practice: Conceptualization and measurement. Health Educ. Res. 1995, 10, 37–50. [Google Scholar] [CrossRef]
- Maurer, T.J.; Pierce, H.R. A comparison of likert scale and traditional measures of self-efficacy. J. Appl. Psychol. 1998, 83, 324–329. [Google Scholar] [CrossRef]
- Bandura, A. Guide for constructing self-efficacy scales. In Self-Efficacy Beliefs of Adolescents; Pajares, F., Urdan, T.C., Eds.; Information Age Publishing: Greenwich, CT, USA, 2006; pp. 307–337. [Google Scholar]
- Baggaley, A.R.; Hull, A.L. The effect of nonlinear transformations on a likert scale. Eval. Health Prof. 1983, 6, 483–491. [Google Scholar] [CrossRef]
- Nunnally, J. Psychometric Theory, 2nd ed.; McGraw-Hill: New York, NY, USA, 1978; ISBN 9780070474659. [Google Scholar]
- Khalid, A. A study of the attitudes and motivational orientations of Pakistani learners toward the learning of English as a second language. SAGE Open 2016, 6, 1–19. [Google Scholar] [CrossRef]
- Lynn, M.R. Determination and quantification of content validity. Nurs. Res. 1986, 35, 382–386. [Google Scholar] [CrossRef]
- Waltz, C.F.; Bausell, B.R. Nursing Research: Design Statistics and Computer Analysis; Davis: Philadelphia, PA, USA, 1981; ISBN 9780803690400. [Google Scholar]
- Field, A. Discovering Statistics Using IBM SPSS Statistics, 4th ed.; Sage: London, UK, 2013; ISBN 978-1446249178. [Google Scholar]
- Hakstian, A.R.; Rogers, W.T.; Cattell, R.B. The behavior of number-of-factors rules with simulated data. Multivar. Behav. Res. 1982, 17, 193–219. [Google Scholar] [CrossRef]
- Zwick, W.R.; Velicer, W.F. Comparison of five rules for determining the number of components to retain. Psychol. Bull. 1986, 99, 432–442. [Google Scholar] [CrossRef]
- Streiner, D.L. Factors affecting reliability of interpretations of scree plots. Psychol. Rep. 1998, 83, 687–694. [Google Scholar] [CrossRef]
- O’Connor, B.P. SPSS and SAS programs for determining the number of components using parallel analysis and Velicer’s MAP test. Behav. Res. Methods Instrum. Comput. 2000, 32, 396–402. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Schwarzer, R.; Jerusalem, M. Generalized Self-Efficacy Scale. In Measures in Health Psychology: A User’s Portfolio. Causal and Control Beliefs; Johnston, M., Wright, S., Weinman, J., Eds.; NFER-NELSON: Windsor, UK, 1995; pp. 35–37. [Google Scholar]
- Sticca, F.; Ruggieri, S.; Alsaker, F.; Perren, S. Longitudinal risk factors for cyberbullying in adolescence. J. Community Appl. Soc. Psychol. 2013, 23, 52–67. [Google Scholar] [CrossRef]
- Del Rey, R.; Casas, J.A.; Ortega-Ruiz, R.; Schultze-Krumbholz, A.; Scheithauer, H.; Smith, P.K.; Thompson, F.; Barkoukis, V.; Tsorbatzoudis, H.; Brighi, A. Structural validation and cross-cultural robustness of the European Cyberbullying Intervention Project Questionnaire. Comput. Hum. Behav. 2015, 50, 141–147. [Google Scholar] [CrossRef]
- Musharraf, S.; Bauman, S.; Anis-ul-Haque, M. A study of the experiences and sociocultural impacts of cyber victimisation in Pakistani students. In Proceedings of the DARTP Inaugural Conference, Birmingham, UK, 6–7 June 2018. Psychol. Teach. Rev. 2018, 24, 574. [Google Scholar]
- Hu, L.; Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Equ. Model. 1999, 6, 1–55. [Google Scholar] [CrossRef]
- Cole, D.A. Utility of confirmatory factor analysis in test validation research. J. Consult. Clin. Psychol. 1987, 55, 584–594. [Google Scholar] [CrossRef]
- Andreou, E.; Vlachou, A.; Didaskalou, E. The roles of self-efficacy, peer interactions and attitudes in bully-victim incidents: Implications for intervention policy-practices. Sch. Psychol. Int. 2005, 26, 545–562. [Google Scholar] [CrossRef]
- Reich, S.M.; Subrahmanyam, K.; Espinoza, G. Friending, IMing, and hanging out face-to-face: Overlap in adolescents’ online and offline social networks. Dev. Psychol. 2012, 48, 356–368. [Google Scholar] [CrossRef]
- Kärnä, A.; Voeten, M.; Little, T.D.; Poskiparta, E.; Kaljonen, A.; Salmivalli, C. A Large-Scale Evaluation of the KiVa Antibullying Program: Grades 4–6. Child Dev. 2011, 82, 311–330. [Google Scholar] [CrossRef] [PubMed]
- Wölfer, R.; Schultze-Krumbholz, A.; Zagorscak, P.; Jäkel, A.; Göbel, K.; Scheithauer, H. Prevention 2.0: Targeting Cyberbullying @ School. Prev. Sci. 2014, 15, 879–887. [Google Scholar] [CrossRef] [PubMed]
- Nunnally, J.C.; Bernstein, I.H. Psychometric Theory; McGraw-Hill: New York, NY, USA, 1967; ISBN 007047849X. [Google Scholar]
S. No. | Item No. | Statements | Factor Loadings | |
---|---|---|---|---|
Factors | EFA | CFA | ||
Factor 1: Privacy and Security (α = 0.89; 0.93) | ||||
1 | 15 | I can easily hide any post that someone shared/tagged on my profile on social networking sites that I mostly use (i.e., Facebook, etc.) | 0.87 | 0.80 |
2 | 13 | I can easily block or restrict anyone on social networking sites that I mostly use (i.e., Facebook, twitter, Skype, WhatsApp, Viber etc.) | 0.83 | 0.79 |
3 | 17 | I can easily set pins/password on my mobile phone to keep it secure. | 0.81 | 0.75 |
4 | 18 | I can easily change password of my email/social networking account that I mostly use. | 0.81 | 0.81 |
5 | 14 | I can easily unfriend anyone on social networking sites that I mostly use (i.e., Facebook, Twitter, Skype, WhatsApp, Viber, etc.) | 0.79 | 0.81 |
6 | 16 | I can easily report a fake account pretending to be me. | 0.76 | 0.70 |
7 | 12 | I can easily report any ID, post, image or video as abusive/spam content on social networking sites that I mostly use (i.e., Facebook, Twitter, Skype, WhatsApp, Viber, etc.) | 0.75 | 0.76 |
8 | 11 | I can easily control privacy settings of social networking sites that I mostly use (i.e., Facebook, Twitter, Skype, WhatsApp, Viber, etc.) | 0.71 | 0.76 |
9 | 19 | I can easily recover my email/social networking account if I forget the password. | 0.58 | 0.72 |
10 | 20 | I can easily handle spams that I received through email or posted on my wall on social networking site (i.e., Facebook, etc.) | 0.54 | 0.68 |
Factor 2: Differentiation and Learning (α = 0.81; 0.83) | ||||
11 | 4 | I can easily judge whether the information that someone has provided on social networking sites is correct. | 0.87 | 0.66 |
12 | 3 | I can easily judge trustworthy information on social networking sites (i.e., Facebook, Twitter, etc.) | 0.85 | 0.73 |
13 | 5 | I am fully aware of the consequences of my conduct on the Internet. | 0.71 | 0.68 |
14 | 1 | I can easily express my point of view on any online discussion forum. | 0.65 | 0.67 |
15 | 2 | When I open any website, I can easily learn in a very short time how to use its features/functions. | 0.64 | 0.77 |
Factor 3: Communication (α = 0.67; 0.67) | ||||
16 | 9 | I can easily use chat rooms on the Internet. | 0.84 | 0.69 |
17 | 7 | I can easily talk to others through the Internet using a webcam. | 0.74 | 0.48 |
18 | 8 | I can easily edit or modify any picture on the computer/mobile phone using different software (i.e., Photoshop, etc.) | 0.55 | 0.74 |
Cronbach Alpha for the composite scale (α = 0.93; 0.92) |
Variables | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
1. Privacy & Security | - | 0.61 ** | 0.43 ** | 0.94 ** | 0.44 ** |
2. Differentiation & Learning | - | 0.43 ** | 0.80 ** | 0.49 ** | |
3. Communication | - | 0.63 ** | 0.27 ** | ||
4. ICT Self-Efficacy | - | 0.50 ** | |||
5. General Self-Efficacy | - |
Variables | Range | ||||||
---|---|---|---|---|---|---|---|
Items | Potential | Actual | M | SD | Skew | Kurt | |
Privacy & Security | 10 | 10–50 | 10–50 | 31.10 | 9.41 | −0.31 | −0.41 |
Differentiation & Learning | 5 | 5–25 | 5–25 | 16.63 | 4.35 | −0.53 | −0.01 |
Communication | 3 | 3–15 | 3–15 | 8.77 | 2.96 | −0.07 | −0.62 |
ICT Self-Efficacy | 18 | 18–90 | 18–88 | 60.77 | 14.52 | −0.86 | 0.44 |
General Self-Efficacy | 10 | 10–40 | 10–40 | 28.39 | 6.35 | −0.49 | 0.07 |
Social Desirability | 16 | 0–16 | 0–16 | 11.19 | 2.87 | −0.57 | 0.20 |
Time Spent Online (Weekdays) | - | - | 0.03–10 | 2.46 | 2.03 | 1.52 | 2.01 |
Time Spent Online (off days) | - | - | 0.08–11.8 | 5.02 | 3.10 | 0.71 | −0.41 |
Time Spent on SNS | - | - | 0.08–10.95 | 2.73 | 2.28 | 1.56 | 2.15 |
Cyberbullying | 20 | 0–80 | 0–37.89 | 4.04 | 6.27 | 2.31 | 6.15 |
Cyber Victimization | 20 | 0–80 | 0–64.21 | 8.87 | 7.84 | 1.80 | 4.93 |
Variables | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
---|---|---|---|---|---|---|---|---|---|
1. Privacy and Security | - | 0.54 ** | 0.40 ** | 0.92 ** | 0.10 ** | 0.15 ** | 0.08 ** | 0.09 ** | −0.02 |
2. Differentiation and Learning | - | 0.38 ** | 0.74 ** | 0.06 | 0.10 ** | 0.02 | 0.01 | −0.03 | |
3. Communication | - | 0.62 ** | 0.01 | 0.14 ** | 0.08 ** | 0.13 ** | 0.14 ** | ||
4. ICT Self-Efficacy | - | 0.08 ** | 0.18 ** | 0.09 ** | 0.11 ** | 0.03 | |||
5. Time Spent Online (Weekdays) | - | 0.45 ** | 0.37 ** | 0.20 ** | 0.16 ** | ||||
6. Time Spent Online (off days) | - | 0.49 ** | 0.27 ** | 0.28 ** | |||||
7. Time Spent on SNS | - | 0.24 ** | 0.33 ** | ||||||
8. Cyberbullying | - | 0.58 ** | |||||||
9. Cyber Victimization | - |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Musharraf, S.; Bauman, S.; Anis-ul-Haque, M.; Malik, J.A. Development and Validation of ICT Self-Efficacy Scale: Exploring the Relationship with Cyberbullying and Victimization. Int. J. Environ. Res. Public Health 2018, 15, 2867. https://doi.org/10.3390/ijerph15122867
Musharraf S, Bauman S, Anis-ul-Haque M, Malik JA. Development and Validation of ICT Self-Efficacy Scale: Exploring the Relationship with Cyberbullying and Victimization. International Journal of Environmental Research and Public Health. 2018; 15(12):2867. https://doi.org/10.3390/ijerph15122867
Chicago/Turabian StyleMusharraf, Sadia, Sheri Bauman, Muhammad Anis-ul-Haque, and Jamil Ahmad Malik. 2018. "Development and Validation of ICT Self-Efficacy Scale: Exploring the Relationship with Cyberbullying and Victimization" International Journal of Environmental Research and Public Health 15, no. 12: 2867. https://doi.org/10.3390/ijerph15122867
APA StyleMusharraf, S., Bauman, S., Anis-ul-Haque, M., & Malik, J. A. (2018). Development and Validation of ICT Self-Efficacy Scale: Exploring the Relationship with Cyberbullying and Victimization. International Journal of Environmental Research and Public Health, 15(12), 2867. https://doi.org/10.3390/ijerph15122867