Research Article
Open access
Published on 7 December 2023
Download pdf
Gao,L.;Ma,Y. (2023). Portraits of the Most Severely Affected Population in Online Violence. Communications in Humanities Research,19,35-41.
Export citation

Portraits of the Most Severely Affected Population in Online Violence

Long Gao *,1, Yangyue Ma 2
  • 1 Wanjiang University of Technology
  • 2 Shanghai University

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2753-7064/19/20231208

Abstract

In today’s new high-tech era, the phenomenon of cyberviolence, with the proliferation of social media in most people’s lives, has attracted global attention to cyberviolence and its victims. More and more research evidence shows that victims vulnerable to cyber violence share many similar characteristics. So, this paper aims to conduct a scientific study to find out the specific portrait of the vulnerable victim group. This paper collects data from network questionnaires, frequency analysis, validity analysis, reliability analysis, and chi-square test. A total of 437 random Chinese netizens participated in this study; the results of the study show that the people who are vulnerable to network violence, basically in line with the portrait, the experimental results present: the susceptible boys are those who are Gentle and Kind, have a postgraduate education, are underage, and work in the service industry. The susceptible girls are radical, with a high school education or below, aged 10-19, primarily underage, and working as housewives. This paper can provide direction for cybersecurity practitioners to reduce the harm suffered by victims of cyberviolence.

Keywords

cyber bullying, victim portrait, social media, safeguard rights and interests, types of online violence

[1]. Livingston, J. D., Cianfrone, M., Korf-Uzan, K., & Coniglio, C. (2014). Another time point, a different story: one year effects of a social media intervention on the attitudes of young people towards mental health issues. Social psychiatry and psychiatric epidemiology, 49, 985-990.

[2]. Cook, C. R., Williams, K. R., Guerra, N. G., Kim, T. E., & Sadek, S. (2010). Predictors of bullying and victimization in childhood and adolescence: A meta-analytic investigation. School psychology quarterly, 25(2), 65.

[3]. Kee, D. M. H., Al‐Anesi, M. A. L., & Al‐Anesi, S. A. L. (2022). Cyberbullying on Social Media under the Influence of COVID‐19. Global Business and Organizational Excellence, 41(6), 11-22.

[4]. Kowalski, R. M., & Limber, S. P. (2013). Psychological, physical, and academic correlates of cyberbullying and traditional bullying. Journal of adolescent health, 53(1), S13-S20.

[5]. Moore, S. E., Norman, R. E., Suetani, S., Thomas, H. J., Sly, P. D., & Scott, J. G. (2017). Consequences of bullying victimization in childhood and adolescence: A systematic review and meta-analysis. World journal of psychiatry, 7(1), 60.

[6]. Lucas-Molina, B., Perez-Albeniz, A., & Fonseca-Pedrero, E. (2018). The potential role of subjective wellbeing and gender in the relationship between bullying or cyberbullying and suicidal ideation. Psychiatry research, 270, 595-601.

[7]. Reijntjes, A., Kamphuis, J. H., Prinzie, P., & Telch, M. J. (2010). Peer victimization and internalizing problems in children: A meta-analysis of longitudinal studies. Child abuse & neglect, 34(4), 244-252.

[8]. Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukophadhyay, T., & Scherlis, W. (1998). Internet paradox: A social technology that reduces social involvement and psychological well-being?. American psychologist, 53(9), 1017.

[9]. Stonard, K. E. (2020). “Technology was designed for this”: Adolescents’ perceptions of the role and impact of the use of technology in cyber dating violence. Computers in human behavior, 105, 106211.

[10]. Peterson, J., & Densley, J. (2017). Cyber violence: What do we know and where do we go from here?. Aggression and violent behavior, 34, 193-200.

Cite this article

Gao,L.;Ma,Y. (2023). Portraits of the Most Severely Affected Population in Online Violence. Communications in Humanities Research,19,35-41.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 2nd International Conference on Interdisciplinary Humanities and Communication Studies

Conference website: https://www.icihcs.org/
ISBN:978-1-83558-181-0(Print) / 978-1-83558-182-7(Online)
Conference date: 15 November 2023
Editor:Enrique Mallen, Javier Cifuentes-Faura
Series: Communications in Humanities Research
Volume number: Vol.19
ISSN:2753-7064(Print) / 2753-7072(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).