Professional Documents
Culture Documents
Dissertation Manuscript
School of Psychology
DOCTOR OF PHILOSOPHY
by
February 2018
ProQuest Number: 13806985
All rights reserved
INFORMATION TO ALL USERS
The quality of this reproduction is dependent upon the quality of the copy submitted.
In the unlikely event that the author did not send a complete manuscript
and there are missing pages, these will be noted. Also, if material had to be removed,
a note will indicate the deletion.
ProQuest 13806985
Published by ProQuest LLC (2019 ). Copyright of the Dissertation is held by the Author.
All rights reserved.
This work is protected against unauthorized copying under Title 17, United States Code
Microform Edition © ProQuest LLC.
ProQuest LLC.
789 East Eisenhower Parkway
P.O. Box 1346
Ann Arbor, MI 48106 - 1346
DocuSign Envelope ID: F994D103-E4BC-4B51-9ABF-E9D3BA3EE948
Approval Page
By
Melissa L. Dark
Nancy Lees
Dissertation Chair: INSERT NAME Degree Held Date
INSERT
Committee Member: Richard NAME Degree Held
Remedios Date
ProQuest Number: (THIS PAGE IS FOR PROQUEST INFORMATION)
ii
Abstract
Cyberbullying is a fairly new phenomenon, and little is known about its effects. Results of
studies conducted with children, adolescents, and young adults indicate that the effects of
cyberbullying may be similar to that of face-to-face bullying (Wiseman, 2012). Recent studies
have focused on traditional bullying in adults in the workplace and have shown that bullying can
cause high turn-over rates for companies, deter productivity and work performance, and reduce
motivation (Coetzee & van Dyk, 2018). In this qualitative study, the perceived effects of
workplace cyberbullying were investigated from the victims’ and the witnesses’ perspectives.
Participants recruited from two ‘cyberbullying’ Facebook pages completed open-ended questions
that elicited employees’ descriptions of the perceived effects of cyberbullying in the workplace,
coworkers, the bully’s role in the workplace (e.g., supervisor or coworker), and the mode (email,
texting, etc.) by which the bullying occurred. The findings of this study found that of the 18
victim participants and 3 witness participants who experienced workplace cyberbullying 76%
were targeted by a colleague whereas 38% were bullied by a manager. Of the victims of
bullying, 48% were upset or depressed, 48% had a loss of productivity or had a difficult time at
work or working. Forty-three percent experienced the workplace cyberbullying on social media
and another 43% were bullied through email. The findings of this study aligned with results of
previous research that had indicated that workplace cyberbullying causes many issues for the
employee as well as the organizations that employ them. Based on the findings from this study, it
cyberbullying in order to see if the perceived effects ever change once out of the environment
iv
which would be even more beneficial to organizations and help them to implement proper
v
Acknowledgement
There are many people that I am grateful for during this long journey. First, I want to
thank my colleagues at Rowan College Gloucester County for not only listening but offering
their experience through this process. A special thanks to Barbara Turner and Stacey Callaway
who helped a great deal in getting through the trail study. I want to thank Dr. Nancy Lees for
guiding me through this process and dealing with my many phone calls, text, and emails. Thank
you to David Woods from Workplace Bullying and Andrew Mitchell from Stop Workplace
Thank you to the love of my life Raymond for supporting me every step of the way and
taking the baby out of the house so I could get work done in peace and be able to concentrate.
Thank you to my mom whom I wouldn’t have been able to finish without her help on my loans
and to my dad who constantly reminded me that he was unbelievably proud of me. Thank you to
my mother-in-law Arlene for always offering to take the baby so I could work. Lastly, thank you
to my kids Jeremy, Jennifer, and Joseph who without knowing it, motivated me to get through.
vi
Table of Contents
Theoretical Foundations.......................................................................................................... 11
What is Bullying? ................................................................................................................... 15
Differences between Traditional Bullying and Cyberbullying. .............................................. 17
Early Literature on Bullying—History of Research on Bullying ........................................... 24
What is Cyberbullying? .......................................................................................................... 25
The Evolution of Cyberbullying. ............................................................................................ 32
Legal Issues with Cyberbullying ............................................................................................ 40
Reporting Cyberbullying ........................................................................................................ 43
Solutions to Cyberbullying ..................................................................................................... 47
Summary ................................................................................................................................. 48
Implications............................................................................................................................. 85
Recommendations for Practice ............................................................................................... 89
Recommendations for Future Research .................................................................................. 90
Conclusion .............................................................................................................................. 90
References ..................................................................................................................................... 93
viii
List of Tables
Table 6. Themes identified in Response to Research Question One and One (a) ........................ 88
ix
List of Figures
x
1
Chapter 1: Introduction
Workplace bullying has been wreaking havoc on employees and the companies at which
they work for quite some time (Rai & Agarwal, 2016). Since the advancement of technology,
bullying has been made easier and can give the perpetrator anonymity if needed (Wiseman,
2012). Cyberbullying is the way for coworkers, supervisors, etc. to bully others without having
to be face-to-face (Coetzee & van Dyk, 2018). Social media is one of the ways that a person can
become a victim of cyberbullying, but it does not stop there. Emails or text are also considered
ways that someone can get cyberbullied (Coetzee & van Dyk, 2018).
Because cyberbullying is a fairly new phenomenon, little is known about the perceived
effects of it, however, the studies that have been conducted with children, adolescents, and young
adults have shown that cyberbullying is at least similar in effects to that of face-to-face bullying
(Wiseman, 2012). Current studies about traditional bullying in adults and the workplace have
shown that bullying can cause high turn-over rates for companies, deter productivity and work
performance, and cause a lower motivational state of mind in the victim (Coetzee & van Dyk,
2018). High turnover rates are very expensive for companies because of the cost incurred during
the hiring process, drug testing, background checks, training, etc. of each new employee
(Coetzee & van Dyk, 2018). Research has shown that 72.7% of adults who have indicated that
Traditional bullying has been found to not only cause psychological problems but
physical problems such as headaches, stomachaches, tiredness, and even to the extent of suicide
(Wiseman, 2012). Cyberbullying can have a greater impact because when an employee is a
victim of cyberbullying, it not only reaches more people, but the victims cannot find safety once
2
they leave their jobs and go home (Wiseman, 2012). The cyberbullying can continue even when
the work day is over, unlike face-to-face bullying, resulting in more issues for the victim.
Technology, social media, and the Internet are all useful tools for a business to grow and
promote but when employees take advantage of these tools, not only do the businesses suffer but
the employees at which the cyberbullying is aimed do too. Research in this area is so important
because this issue will only increase as technology grows and becomes more advanced.
Research may also provide information that may be used to develop policies and procedures that
would aide in handling cyberbullying that currently is taking place in the workplace. Policies
and procedures must be put in place so that employees can continue to be productive in their job
and the companies can continue to thrive without having to worry about high turnover rates.
Current research has found that cyberbullying in the workplace can cause
counterproductive work behaviors to manifest and that more research is needed in order to find
other issues that the employee could display and how it would affect a company if no procedures
were put in place (Keskin, Akgün, Ayar, Kayman, 2016). Also, because the effects of
cyberbullying have been studied in adolescents and young adults, demonstrating negative impact
on the victim, it is important to study adults because negative consequences may carry over into
adulthood. Studies on adolescents have found that adolescents that were cyberbullied presented
higher levels of loneliness and lower levels of social well-being than those who identified as not
It cannot be assumed that people just stop cyberbullying or stop being a victim of
cyberbullying because they got older. It has also been found that those who use face-to-face
bullying are more likely to cyberbully (Lazuras, Barkoukis, & Tsorbatzoudis, 2017).
Cyber-victimizations more often occur among those who are victims of traditional bullying, and
3
victims of traditional bullying may actually change roles and become the person who
The problem addressed by this study is that adults in the workplace are being affected by
cyberbullying. The general problem is that as technology advances, common forms of bullying
are also advancing. Bullying has moved to an anonymous form known as cyberbullying; and
ease of use makes it that much more popular as a means of harassment. Cyberbullying comes in
many forms and can include denigration, verbal fights, cyberstalking, exclusion, pretending to be
someone, and outing (Smith, 2015). Once only thought to be a problem amongst adolescents and
young adults, cyberbullying has moved into the workplace, affecting not only the employees but
the employers as well. The specific problem is that the impact of cyberbullying has on adults in
workplace resulting in a lack of legal actions against those who commit cyberbullying in the
workplace (Kowalski et al., 2018). Knowing the perceived effects that cyberbullying can have
on the employees as well as the business can help employers implement procedures to counteract
these issues. The negative consequences, if this problem is not solved, are increased issues with
employees and the workplace as well as rising cost for the company because of high turn-over
rates.
The purpose of this qualitative study was to explore the impact that cyberbullying has on
adults in the workplaces. The study was conducted by administering open-ended questionnaires
to participants online. The phenomena of interest is cyberbullying and its perceived effects. A
4
descriptive design, with the intent of describing and understanding a phenomenon little explored,
workplace cyberbullying, was used. Materials included open-ended questionnaires and analysis
was conducted by using an open coding method where themes were identified. The responses
were analyzed and grouped to determine the different themes using such factors as word
repetition and key words. The population and sample size that was needed was 20-25 male and
The research was conducted by collecting data via the internet for workers located in the
United States. Participants were recruited via posts to Facebook groups and sent to a screening
questionnaire on SurveyMonkey. If the participants met all requirements, they were given the
informed consent and continued onto the questionnaire. The participants had to be current
victims or witnesses at the job in which they identified as being cyberbullied. This study
examined what the perceived effects of cyberbullying on employees are. Since current studies
have found that cyberbullying is very prominent in adolescents and young adults, it is expected
that as these youths grow, the incidence for cyberbullying in later adulthood will be more
prominent, making the research that much more critical (Jenaro, Flores, & Frías, 2018).
Theoretical/Conceptual Framework
Albert Bandura’s Moral Disengagement Theory and Icek Ajzen’s Theory of Planned
Behavior serve as theoretical foundations for this research study. Moral Disengagement Theory
is described as a way in which people rationalize their unethical actions (Bandura, 2002). This
theory aligns with the intent of this study because it shows why people may feel justification to
the cognitive restructuring of inhumane actions into a benign moral justification and safeguards
should be built into social systems that would uphold moral and compassionate behavior and
5
reduce cruelty. Using Moral Disengagement Theory in cyberbullying research can help identify
whether the settings may afford selective activation in areas of moral disengagement and be a
valuable asset for cyber-safety programs that the employers can implement (Runions & Bak,
2015). It will also be useful for understanding how online workplace setting may differentially
afford moral disengagement and aide in planning intervention programs and reduce cyber-
variables including subjective norms, attitude, and Perceived Behavioral Control (Cyberbullying
among students: An application of Theory of Planned Behavior, 2017). Subjective norm relates
to how a persons’ perception of the surrounding environment relates to their behavior and
attitude is the degree to which a person displays either positive or negative attitude towards a
Behavior, 2017). Theory of Planned Behavior also incorporates Perceived Behavioral Control
Planned Behavior, 2017). According to Ajzen, (1991), applying the Theory of Planned Behavior
to a particular area, in this case cyberbullying, can provide useful information in any attempt to
actually understand the person’s behaviors or to implement interventions that can be effective in
changing those behaviors. The Theory of Planned Behavior aligns with the intent of this study
because it provides a connection between behavior and beliefs. The foundation of beliefs can
provide descriptions that are needed to gain information about a person’s behavioral
determinants and it is thought that it is the level of beliefs that we can learn the unique factors
that cause a person to engage in cyberbullying and cause others to follow (Ajzen, 1991). This
6
study may contribute to the theory by demonstrating a person’s environment, including the
virtual environment, does in fact affect their behavior and perception of the behavior.
Both Theory of Planned Behavior and Moral Disengagement Theory are interrelated in
Behavioral Control, the effortlessness of acting on a certain behavior, in this case cyberbullying,
makes it easier for the cyberbully to commit these acts because of the lower risk of getting
caught with the anonymity offered by the internet (Pabian & Vandebosch, 2014). And with
Moral Disengagement Theory, the offender can justify his act in order to feel that he or she is not
doing anything wrong. Both theories play a role in understanding why co-workers may bully. If
someone understands why it is happening, safeguards can be put in place to help the victims so
of how employees perceive the effects of cyberbullying in the workplace. The researcher used
perceived effects of cyberbullying among adults in the workplace. Adults aged 21 and higher
across the United States who are employed and identify as being current victims and/or witnesses
open-ended questions, the study addressed the research questions, interpreting the results through
the lens of Albert Bandura’s Moral Disengagement Theory and Icek Ajzen’s Theory of Planned
Behavior. Open-ended questionnaires offer several benefits when trying to study an undesirable
7
behavior. Open-ended questions can reassure the researcher that all issues have been covered
A qualitative method was chosen for this study because qualitative methodology can
produce a description of the participants’ feeling, opinions, and experiences, as well as interpret
the meaning of the participants’ actions (Rahman, 2016). Qualitative research is also important
A descriptive design was chosen for this study because qualitative descriptive studies use
a more naturalistic inquiry which is important when studying workers natural response to
cyberbullying (Lambert & Lambert, 2012). Descriptive studies also incorporate features from
other design types. For example, if a comparative analysis was used in examining the data
produced by the study, it may resemble grounded theory but since it is not producing a theory
from the data collected, it is a descriptive study (Lambert & Lambert, 2012).
Research Questions
The problem is adults in the workplace are being affected by cyberbullying. The purpose
of this descriptive qualitative study was to explore the impact that cyberbullying has on adults in
workplace?
coworkers?
8
This study is important because workplace cyberbullying can have an emotional and
physical health impact on the victim as well as cause work disruption (Keskin et al., 2016). By
identifying the emotional and physical impacts, organizations may develop and implement
prevention programs in order to remedy the problem. These results will also contribute to the
Much of the current literature focuses on youth and adolescents, however, this problem
will continue as the youth and adolescents that are currently cyberbullies age and more forms of
social media and types of technology emerge. By addressing the issues that are caused by
cyberbullying, adults can function as more productive employees. The results can be used to fill
in any gaps between cyberbullying and adults in the workplace and can be useful for employers
in identifying cyberbullying that may be occurring in the organization. This study will contribute
to Moral Disengagement Theory by identifying the settings, including virtual settings, that may
afford selective activation in areas of moral disengagement and be a valuable asset for cyber-
safety programs that the employers can implement (Runions & Bak, 2015). This study will also
environment does in fact affect their behavior and perception of the behavior.
The following list of key terms is important to the topic of cyberbullying and these terms
may not be common knowledge to someone who is not familiar with cyberbullying.
Cyberbullying. Cyberbullying is using the internet and cell phones to intentionally harm
someone (Reio & Ledesma Ortega, 2016). It is also defined as using modern technology to
embarrass, threaten, humiliate, or intimidate another as well as gain power over them (Bauman,
2011).
harass others however adds the element of physical dominance and the bully and victim are face-
Social Media. Social Media is application and websites that offer a means of
communication that are used by much of the population to share information and offers a way for
Summary
This study is prepared and presented in five chapters. Chapter 1 details how, with the
advancements in technology, traditional bullying has moved into an electronic version know as
cyberbullying. Knowing the perceived effects that cyberbullying can have on the employees as
well as the business can help employers implement procedures to counteract these issues.
The problem this phenomenon has created for employees is demonstrated and the study
is guided by the questions, how do employees describe the perceived effects of cyberbullying in
the workplace and how do employees describe the perceived effects of cyberbullying on
coworkers? The impact that cyberbullying has on adults in the workplace are not known. The
negative consequences, if this problem is not solved, are increased issues with employees and the
workplace as well as rising cost for the company because of high turn-over rates.
Albert Bandura’s Moral Disengagement Theory and Icek Ajzen’s Theory of Planned
Behavior serve as theoretical foundations for this research study. The purpose of this study was
10
to explore the impact that cyberbullying has on adults in the workplaces. The study was
design, with the intent of describing and understanding a phenomenon little explored, workplace
The significance of this study is that workplace cyberbullying can have an emotional and
physical health impact on the victim as well as cause work disruption (Keskin et al., 2016). The
results can be used to fill in any gaps between cyberbullying and adults in the workplace and can
be useful for employers in identifying cyberbullying that may be occurring in the organization.
This chapter also discusses the qualitative procedures used and definitions of the terms. Chapter
2 will continue with literature review and theoretical framework. The purpose of Chapter 2 is to
provide the reader with a comprehensive review of the literature related to cyberbullying in the
workplace.
11
traditional face-to-face act of bullying has become an easier task for the bully by offering
anonymity so that one can harass co-workers by denigration, verbal fights, cyberstalking,
exclusion, pretending to be someone, and outing (Smith, 2015). Chapter 2 provides an extensive
Chapter 2 will be divided into sections that include: Moral Disengagement Theory,
Theory of Planned Behavior, differences between traditional bullying and cyberbullying, effects
history of cyberbullying with adolescents, and the evolution of cyberbullying. The chapter
continues with how adults cyberbully, why adults cyberbully, co-workers as bystanders, legal
workplace policy, and solutions to cyberbullying. The purpose of this qualitative study is to
This literature review consists of literature pulled from the following EBSCO databases:
The keywords used either individually or combined include: cyberbullying, traditional bullying,
Behavior, legal issues, evolution, technology, effects, co-workers, reporting, workplace policies,
Theoretical Foundations
Two theories provide the foundation for this study of cyberbullying in the workplace.
These theories include Albert Bandura’s Moral Disengagement Theory and Icek Ajzen’s Theory
12
of Planned Behavior. Both theories play a role in understanding why co-workers may bully. If
someone understands why it is happening, safeguards can be put in place to help the victims so
which people rationalize their unethical actions (Bandura, 2002). This theory aligns with the
intent of this study because it shows why people may feel justified to commit acts of
cyberbullying. When peoples’ actions are conflicting with their moral standards, it is moral
disengagement that allows them to distance themselves and avoid such emotions as guilt or
such as cyberbullying (Runions & Bak, 2015). Moral Disengagement Theory has been well
documented as one of the most observed predictive variables of cyberbullying (Wang, Yang,
as why someone would commit it or why someone may be a victim. It is imperative to recognize
all aspects of cyberbullying in order to really understand the perceived effects of it on the victim.
Studies have been conducted on cyberbullies to see if there was a link between those who
One study found that those who identified as cyberbullies as well as victims showed a
significantly higher level of moral disengagement (Renati, Berrone, & Zanetti, 2012). Since the
Theory can be applied to this study to further understand the extend of issues that cyberbullying
13
can cause a victim. The researchers also mentioned that moral disengagement involves
dehumanization of the victim in order to endorse immoral behaviors because the cyberbullies
view the victim as subhuman and that they do not deserve to be considered within the frame of a
conventional moral codex therefore blaming the victim and making their actions acceptable
When looking at moral disengagement in the general bullying context, it is the process
that allows those who censure bullying to actually bully others by disengaging their own moral
standards in each episode of bullying, so they do not feel as though they lost any self-regard
(Bussey, Fitzpatrick, & Raman, 2015). Friends also play a role in moral disengagement and
cyberbullying. Friends can affect individual cognitions about bullying others by distorting the
severity or the consequences of bullying, using euphemism to label the behavior, minimizing the
victim’s agentive role, or blaming the victim (Sijtsema, Rambaran, Caravita, & Gini, 2014).
behavior is reflected by three variables including subjective norms, attitude, and Perceived
Behavior, 2017). Subjective norm relates to how a persons’ perception of the surrounding
environment relates to their behavior and attitude is the degree to which a person displays either
positive or negative attitude towards a particular behavior (Minnesota State University, 2018)
The use of social media and other forms of electronic communication have become an
intrinsic part of most people’s lives (Cheung & To, 2016). Because of this, Theory of Planned
14
Behavior has been applied to describe people’s behavior when conducting online activities.
Theory of Planned Behavior is generally applied to all volitional activities and can predict
specific behavior across occasions, situations, and different forms of actions (Jafarkarimi,
Saadatdoost, Sim, & Hee, 2016). One of the core elements of Theory of Planned Behavior is the
intention and refers to a person’s readiness to perform a given behavior (Jafarkarimi et al., 2016).
When social media users develop a favorable attitude toward co-creation within social
media, they are more prone to use social media for co-creation activities. Users who consider
themselves to be more heavily influenced by their peers to co-create are more prone to follow the
behavior of their peers (Cheung & To, 2016). This includes the activity of cyberbullying. One
study that aimed at finding the link between risky online behavior and the Theory of Planned
Behavior found that prototype favorability, which is how someone judges their perception of a
normal person to engage in online risky behavior, emerged as a strong predictor of willingness to
Both Theory of Planned Behavior and Moral Disengagement Theory are interrelated in
Behavioral Control, the effortlessness of acting on a certain behavior, in this case cyberbullying,
makes it easier for the cyberbully to commit these acts because of the lower risk of getting
caught with the anonymity offered by the internet (Pabian & Vandebosch, 2014). And with
Moral Disengagement Theory, the offender can justify his act to feel that he or she is not doing
anything wrong. Both theories play a role in understanding why co-workers may bully which in
understanding why it is happening, safeguards can be put in place to help the victims so that they
What is Bullying?
The following section of literature review will look at what the meaning of bullying is.
Volk, Dane, and Marini, 2014, defined bullying as exposed, repeatedly and over a period of time,
a negative action by another person. It is important to define bullying more specifically as goal-
directed behavior in order to be consistent with research in bullying literature, and because
greater specificity may afford researchers more theoretical, methodological, and applied benefits
(Volk et al., 2014). Another researcher defines bullying as having three components of
purposeful, imbalance, and continual and as well bullying occurs in both physical, social and
emotional context and is committed by a more powerfully person to one that is less powerful
Bullying is also associated with contrasting social responses (Volk, Veenstra, &
Espelage, 2017). It is likely to be seen by by-standers as more negative than other forms of
aggression, however, people tend to show a stronger tendency to associate themselves with
powerful people who can directly help them obtain their own goals (Volk et al., 2017). Bullying
can be covert or overt and is frequently missed by managers and supervisors but usually well
known by many employees in the organization (Shu-Ching, Hsiu-Hung, & Tsair-Wei, 2017).
Traditional bullying also comes in many forms. These forms can include physical,
verbal, and social bullying (Case, 2015). Punching, hitting, pushing, etc. are all examples of
physical bullying (Case, 2015). Even mean or rude gestures can count as physical bullying
(Case, 2015). Verbal bullying consists of saying or writing hurtful things to one another such as
name calling, teasing, threatening to harm one another and social bullying consist of intentional
aggression that can damage or defame someone’s reputation (Case, 2015). Some examples of
social bullying can include spreading rumors, public embarrassment, etc. (Case, 2015). From a
16
business standpoint, bullying intentions or behaviors are hard to understand because there are
2012). Many researcher definitions of workplace bullying also add that targets of bullies usually
are unable to defend themselves against bullying attacks (Wilson & Nagy, 2017). These can
include legal risks to the bully and damage to corporate reputation (Piotrowski, 2012).
bullying is a repeated behavior that can offend, humiliate, sabotage, or negatively affect a
person’s work when there is an imbalance of power (Privitera & Campbell, 2009). This type of
bullying is also considered to occur when one or more workers perceive themselves to be the
target of ongoing and systematic negative acts on at least a weekly basis extending over a period
of 6 months (Privitera & Campbell, 2009). Like traditional bullying, workplace bullying consists
of an imbalance of power between the bully and the victim in addition to the victim’s attribution
Workplace bullying has even been compared to domestic violence by The Workplace
Bullying Institute (Manners & Cates, 2016). This type of bullying in the workplace resembles
the experience of a spouse that is battered because the abuser will inflict pain when and where
they choose which keeps the victim unaware when it will happen again and giving false hope
that they are safe during periods of peace of unknown duration (Manners & Cates, 2016). The
victim is also kept close to the bully by the nature of their relationship, husband to wife or co-
worker to co-worker (Manners & Cates, 2016). According to research conducted by The
Workplace Bullying Institute, 2007, 58 percent of the bullying targets are female, sixty-two
percent of the perpetrators are men, 75 percent of bullying happens when the bully belongs to a
17
protected category, and Hispanics and African Americans are more likely to experience bullying
bullying. Upward bullying has the most risk for repercussion because it involves an employee
bullying their manager or supervisor (Zhang & Leidner, 2018). Horizontal bullying is basically
co-workers bullying other co-workers and lastly downward bullying is the most aggressive form
and involves managers bullying their subordinates (Zhang & Leidner, 2018). Downward
bullying is the most common type seen in the workplace and often leads to a conditioning effect
in which the managers grow accustomed to justifying their behavior (Zhang & Leidner, 2018).
Managers who bully usually were a victim of bullying themselves by their superiors and since
they have experienced the pain of downward bullying as opposed to horizontal or upward
bullying, they can easily rationalize their own behavior of bullying (Zhang & Leidner, 2018).
Other research has indicated that supervisors who bully are generally careless, shoddy,
This section was able to demonstrate how different researcher define bullying. It is
with research in bullying literature (Volk et al., 2014). Many of the studies conducted on
bullying found that the findings were descriptive and correlative, so therefore cannot be used to
make casual claims as to why bullying behavior transpires (Kowalski et al., 2018).
types of bullying, traditional and cyberbullying, can have a negative impact on adults in the
18
workplace, however, there are several differences between the two. There are not only
differences between how the two types of bullying are carried out, but how they affect their
targets as well (Kowalski et al., 2018). Bullying involves repeated harm to a weaker person and
qualifies as immoral behavior because it impacts the welfare and rights of the victims, however,
the lack of social censer that cyberbullying enables through the lack of face-to-face interaction
means that the social restraints tied with traditional bullying are not a factor which enhances the
role of personal factors in cyberbullying that are prominent in the association between bullying
The most observable difference between traditional bullying and cyberbullying is how it
is carried out. Traditional bullying is carried out face-to-face, and is based on physical contact
and power imbalance, whereas cyberbullying is anonymous, can reach a greater audience, and
utilizes multiple means from mobile phones to social media (Lazuras et al., 2017). Dooley,
Pyzalski, and Cross (2009) conducted a theoretical and conceptual review of cyberbullying
versus traditional bullying. The first component mentioned the differences between the two is
For traditional bullying, the act when committed must be aggressive, intentional,
repetitive, and with a power imbalance (Dooley et al., 2009). However, cyberbullying is
deliberate, repeated, and hostile but lacking the power imbalance that is demonstrated in
traditional bullying (Dooley et al., 2009). Another component mentioned the differences
between both types of bullying is what is considered repetitive. When it comes to traditional
bullying, it is argued that what makes it bullying is the repetitive nature of the acts that are
intended to cause harm and not the actual nature of the behavior (Dooley et al., 2009).
Repetition is actually one of the most important elements when defining bullying (Patchin &
19
Hinduja, 2015). If someone were to push someone in the hallway once and never again, that
would not be considered bullying but if that continued repeatedly, it would be labeled as bullying
Traditional bullying is a repeating act whereas cyberbullying can occur with one single
act and can extend to multiple environments (Asher, Stark, & Fireman, 2017). Another
difference is the number of adults that are bullied. Twenty percent of one research study that
looked at a total of 3,699 were cyberbullied compared to only 7.5% who were bullied in the
traditional way (Kowalski et al., 2018). It was also shown that traditional bullying differed from
cyberbullying by intention, acceptability, and severity with traditional bullying perceived as the
most severe and having the most intention of harm (Kowalski et al., 2018).
There are also differences when it comes to effects of each type of bullying. Traditional
bullying only takes place where the victim is and resulted in a higher degree of embarrassment
whereas cyberbullying resulted in a higher degree of anger (Asher et al., 2017). Also, victims of
traditional bullying were more likely to seek help compared to using avoidance techniques when
dealing with cyberbullying (Asher et al., 2017). Most victims of cyberbullying report that they
experience at least one form of traditional bullying, and relational and verbal forms showed the
most overlap with cyberbullying (Waasdorp & Bradshaw, 2015). Compared to traditional
bullying, cyberbullying has a higher rate of victims internalizing and externalizing symptoms
(Waasdorp & Bradshaw, 2015). A single act of online cruelty can be considered bullying
because of the permanence of such things as pictures or videos online for anyone to see and can
have the same, or even worse, effects than traditional bullying (Dooley et al., 2009).
There are, however, some similarities between the two types of bullying. Traditional
bullies tend to engage in cyberbullying more than that of a non-bully and victims of traditional
20
bullying experienced cyberbullying more often than that of a non-victim (Lazuras et al., 2017).
Even with these slight similarities, many research studies have found many differences between
Effects of traditional bullying. Since traditional bullying has been around for quite
some time, extensive research has been done to investigate the effects of traditional bullying.
Findings have shown that bullying leads to physical health complaints and other work-related
negative effects on the employee (Piotrowski, 2012). There is also a link between workplace
bullying and sick leave or sick time being used (Wilson & Nagy, 2017).
Other effects that research has found include a higher intention to leave the organization,
PTSD, or Post Traumatic Stress Disorder, and increased risk to cardiovascular disease, and a
decrease in emotional health (Wilson & Nagy, 2017). The effects of traditional bullying in the
workplace do not just stop when the workday is over but can spill over into a worker’s personal
life as well (Creasy & Carnes, 2017). Implications of bullying can include drinking problems,
It is also thought that the effects are greatest for someone who experiences both face-to-
face bullying and cyberbullying (Waasdorp & Bradshaw, 2015). These issues have all been
found to be associated with employees who are being bullied by their supervisor or project
Micromanaging tells the employee that the manager has a lack of trust, autonomy and
recognition (Trad & Johnson, 2014). Micromanaging is seen by some employees as bullying if
the manager has personal motives or subjective reasons for doing it (Trad & Johnson, 2014).
These effects are focused on management cyberbullying of the victim; however, co-
workers can also cause issues with employees within the organization. Trad and Johnson, 2014,
21
wanted to see how bullying would affect job performance and the work environment among co-
workers in the particular field of radiation therapy. Prior research has shown that 35% of
Americans have experienced bullying in the workplace with an additional 15% having witnessed
some form of bullying at work (Trad & Johnson, 2014). In this research study that focused on
radiation therapy, a health field which has been found to have the highest incidence of bullying,
the researchers found that out of the 308 participants, 194 of them indicated that they
experienced bullying either at their current jobs or previous radiation therapy job (Trad &
Johnson, 2014). This result shows that almost 63% of the participants experienced bullying in
the workplace which is a significant amount and that it effected their job performance as well as
their job satisfaction (Trad & Johnson, 2014). Other studies have indicated that some effects of
being bullying by a co-worker can include workplace withdrawal, decline to physical health, and
even suicidal ideation (Creasy & Carnes, 2017). However, bullying that is perpetrated by
supervisors or managers produces more of the negative correlates of victimization then if a co-
worker were to display the same exact behavior (Kowalski et al., 2018).
Another health field that has research showing effects of bullying is nursing. In this
health field, it is thought that the newer nurses are bullied by experienced nurses (Ren & Kim,
2017). Ren and Kim, 2017, wanted to test a proposed structural question model in which
predict a persons’ psychological well-being among nursing student during their clinicals. After
data analysis was conducted on self-reporting questionnaires, it was found that the effects on
psychological well-being include depression, lower self-esteem, and even lower academic
satisfaction (Ren & Kim, 2017). Mediation by conflict management styles and psychological
22
empowerment eased the negative effect of bullying on a persons’ psychological well-being (Ren
Bullying can also affect students who work under others during training or in the case of
a nurse, their clinicals. This can lead to a nurse second guessing their academic path and lead
them to switch majors which is time consuming and costly for the student (Ren & Kim, 2017).
Yet another study that examined bullying behavior in the nursing field found that the employees
defined bullying as a person who is teased repeatedly in a way that they do not like however they
commented that bullying does not exist if both nursing students are the same strength or power,
and it is not bullying if the nursing student is teased in a friendly way (Shu-Ching et al., 2017).
Traditional bullying, unlike cyberbullying, also lets the perpetrator see the effect it causes on the
Besides the health field, the education field has also been shown to experience issues of
bullying (Reed, 2016). A study by Reed, 2016, focused on how non-tenured faculty describe the
effects of bullying on emotional well-being however previous studies in university academia are
said to be under reported for fear of retaliation. The researcher used ten senior/tenured faculty in
order to get their story that involved bullying and this was done by using date collection
consisting of interviews (Reed, 2016). Constant comparison and thematic analysis were used to
find that fear and confusion were the two main themes indicated (Reed, 2016).
An important issue of workplace bullying is the potential that bullying behavior will
become a negative exemplification in which other employees may, in turn, model (Reed, 2016).
Fear in the areas of job loss, physical/mental harm, fear of the unknown, and loss of self-worth
are usually experienced by victims (Reed, 2016). Negative outcomes displayed by victims
usually consist of decreased self-esteem, anger, depression, anxiety, PTSD, and physical illness
23
(Reed, 2016). Not only do victims display negative outcomes, but they also displayed negative
effects which included thoughts that remaining at their job is not worth the cost to their self-
esteem and self-health (Reed, 2016). Three dimensions explain the nature of bullying behavior
among university staff including exclusion and discrimination, person-related belittlement, and
professional undermining (Meriläinen, Sinkkonen, Puhakka, & Käyhkö, 2016). The nature of
Research has not only looked at the effects of bullying but has looked at the long-term
effects of bullying. This, however, will not be the case for cyberbullying for some time since it
is such a new phenomenon. Nonetheless, it is still important to find the long-term effects of
traditional bullying to gauge what someone may experience later down the line.
Wolke and Lereya, 2015, reviewed prior research in order to find all the lasting effects
that have been shown from bullying on adolescents and adults. There are both physical and
mental effects. For adolescent victims, it was found that they are at a higher risk for somatic or
psychosomatic problems and more often develop internalizing problems, anxiety disorder, or
depression disorder (Wolke & Lereya, 2015). For adults, the victims describe their encounters as
traumatic and that they fostered fear and confusion within them that extended to their personal
life and compromised their emotional security, physical health, social learning, ego development,
and their hierarchy of even basic needs (Reed, 2016). Victims have also reported that they have
a harder time making or keeping friends and are less likely to live with a partner (Wolke &
Lereya, 2015).
Over time, internalizing problems can increase and there is an increased risk of self-harm
or suicidal thoughts for those who have been bullied (Wolke & Lereya, 2015). Furthermore, if a
24
person was bullied in primary school, they will display personality symptoms and psychotic
experiences by adolescence (Wolke & Lereya, 2015). For adults, research shows that they are at
an increased risk for displaying psychotic experiences and having suicidal ideation, attempts, and
completed suicides as well as poor general health, lower educational qualifications, bad financial
management, earn less than their peers, and have trouble making and keeping friends (Wolke &
Lereya, 2015).
There is also effects of traditional bullying on the organization as well. Research has
found that acts of bullying can deter productivity and work performance which can be costly to
an organization (Coetzee & van Dyk, 2018). Bullying also lowers job satisfaction which creates
higher turnover rates (Snyman & Loh, 2015). Since cyberbullying has been shown to cause
more of an impact on the victim then traditional bullying, it may also have more of an impact on
Since both types of bullying, traditional and cyberbullying, can have a negative impact on
adults in the workplace, it is important to not only know the difference between the two but
know how the two types of bullying are carried out. Since traditional bullying has been around
for quite some time, extensive research has been done to investigate the effects of traditional
are fairly new. There has also been little to no research on the theoretical construct of
cyberbullying and if using electronic media to commit cyberbullying is the same to engaging in
The following discussion examines early literature on bullying and history of research on
bullying. The very first research study on bullying was conducted by Dr. Dan Olweus in the
25
1970’s (Hymel & Swearer, 2015). Based on Olweus research, bullying was defined as a
imbalance of power, and abuse of power, all of which was the distinction between bullying and
other forms of aggression (Hymel & Swearer, 2015). However, this research study was
conducted in Scandinavia. Significant research on bullying did not hit North America until
tragedies such as Columbine hit in the 1990’s (Hymel & Swearer, 2015).
Since these tragic events occurred and teen suicide increased, attention in the media and
in academia rose which eventually inspired the 2011 U.S. White House Conference on Bullying
(Hymel & Swearer, 2015). This conference invited recognized scholars to critically review
current research and theory on bullying in order to inform future research and practice (Hymel &
Swearer, 2015). The first research study, however, that focused on workplace bullying was in
1990 by Leyman in which he pathed the way to subsequent research on this topic (Rai &
Agarwal, 2016).
What is Cyberbullying?
The meaning of cyberbullying is still emerging. Since many organizations have moved
to online work because of the increased efficiency and flexibility, the potential for new forms of
workplace aggression is there which is known as workplace cyberbullying (Vranjes et al., 2017).
use of such items as phones or computers (Doane, Boothe, Pearson, & Kelley, 2016).
Technology can be abused to not only increase the scale and scope of bullying but the
duration as well (Cohen-Almagor, 2018). This type of bullying can follow victims into their
homes and be expressed on their personal electronic devices (Cohen-Almagor, 2018). The
audience for cyberbullying is much larger and can reach this audience much faster than
26
traditional bullying (Cohen-Almagor, 2018). Sites such as Facebook, Instagram, and Snapchat
are applications that a person could use to commit the act of cyberbullying. Facebook, being one
of the largest social media sites, has become such a popular way to bully because of high
perceived anonymity, low supervision, a larger audience, and no time limits (Frison,
Ways in which sites such as Facebook are used to cyberbully are sending harmful
messages or posting pictures that are embarrassing as well as insulting comments and since
people have more access to social information, it makes it even easier to cyberbully (Frison et
al., 2016). Social media encourages cyberbullying because it allows people to interact, such as
commenting, sharing videos, and posting photos to another person’s page (Lowry, Moody, &
Chatterjee, 2017).
Revenge porn is another form of cyberbullying that can be used to hurt someone.
Revenge porn involves online sharing of videos or picture of a sexual nature without the victim’s
consent (El Asam & Samara, 2016). This can happen, for example, between co-workers who
may have dated and shared this type of sensitive material but then later broke up resulting in one
acts of aggression are now considered as a mental and public issue (Ashiq, Majeed, & Malik,
2016). Even though some acts of cyberbullying can be benign, others can have detrimental
effects, such as suicide, on the victim (Lowry et al., 2017). Cyberbullying does not just happen
among co-workers and managers, but customers can also be cyberbullies. An example of this
would be an online customer that is causing the worker extreme stress and discomfort (Lowry et
al., 2017). However, since workers must maintain a clear, dynamic, and connected nature of the
27
interaction with the customer, it is important that employees do not betray any anti-customer
sentiment while they themselves face customer bullying (D'Cruz & Noronha, 2014).
There are actually several groups of people that can be involved in cyberbullying.
Assistants are those who join into the acts of cyberbullying as well as add their own insults
(Cohen-Almagor, 2018). Reinforcers are there to encourage the cyberbully by providing them
with positive feedback (Cohen-Almagor, 2018). Watchers remain passive while watching but do
not interfere while outsiders move away from the cyberbullying and withdraw (Cohen-Almagor,
2018). Lastly, the defenders are there to actively intervene in order to protect the victim (Cohen-
Almagor, 2018). The only group of people that are not complicit in the acts of cyberbullying
impact on an adolescent’s psychological state. Researcher Dilmaç, (2017) aimed to find the
relationship between teens’ level of hopelessness and cyberbullying. The researcher hypothesize
that values influence hopelessness and cyberbullying and that hopelessness influences
cyberbullying (Dilmaç, 2017). The researchers found that there is a negative linear relationship
between adolescents’ values and their level of cyberbullying which indicates that an adolescents’
level of cyberbullying decreases as their values increase (Dilmaç, 2017). This study offers a
values among adolescents and their cyberbullying behaviors. Many research studies aim at
finding the effects of cyberbullying on adolescents and interventions placed to prevent the effects
of cyberbullying on adolescents. Bauman and Newman, 2013, wanted to test the assumption that
cyberbullying may cause greater harm than conventional bullying. The researchers used
questionnaires to compare different scenarios of each cyberbullying and traditional bullying and
28
found that distress is actually caused by the incident of bullying and not by how the bullying
occurred. Even though there was no indication that cyberbullying is more harmful, the
researchers do stress the importance of implementing strategies to help victims by the actual
examine the evidence of cyberbullying interventions for teens who are experiencing symptoms
of depression because of being a victim of cyberbullying (Reed, Cooper, Nugent, & Russell,
2016). Literature review was conducted by searching the University of Tennessee online library
using key terms and focused on 12-18-year-old who were victims of cyberbullying and the
theoretical framework for this article discusses that social identity theory may explain why teens
yearn to be a part of group thus leading to participating in online harassment of peers (Reed et
al., 2016). After review of several articles, the authors concluded that many of the research
articles findings show evidence that engaging in cyberbullying, either as the victim or aggressor
adolescents is ranked the lowest anxiety-producing stimuli due to parents feeling far removed
Parents and adolescents generally have different views when it comes to cyberbullying
and the link with social media use. Teens feel the need to use social media as a means to
construct their social identity (Oberst, Wegmann, Stodt, Brand, & Chamarro, 2017). This need
can become obsessive thus leading to addictive tendencies towards usage of social media.
Parents feel that excessive use among teen on social media sites will lessen their involvement
with their real-world environment and any school issues they may have (Oberst et al., 2017).
Some key components that lead to certain cyberbullying theories look at usage of social media
29
among adolescents. Adolescents that display higher levels of depression will engage in higher
levels of social comparison and feedback seeking (Nesi, Miller, & Prinstein, 2017).
Also, increased use of social media can have a negative impact on the psychological
well-being of an adolescent and depressed teens tend to have a higher usage rate of social media
then that on non-depressed teens (Radovic, Gmelin, Stein, & Miller, 2017). Addictive behaviors
towards information technology such as social media are showing signs of psychological issues
among adolescents as well as the fear of missing out (Oberst et al., 2017).
Even though past research has found an association between the two, the actual cause and
effect link has not been found (Reed et al., 2016). Prior studies have also been done to compare
cyberbullying with substance abuse in adolescents. Researchers Selkie, Kota, Chan, and
Moreno, 2015, studied the relationship between involvement in cyberbullying and depression or
alcohol use by female college students. The researchers used logistic regression to test the
associations between the involvement of cyberbullying and depression or problem drinking. The
authors found that 27% of the participants were victims of cyberbullying, 17.4% had signs of
depression, and 37.5% had a drinking problem. These findings suggest that those with any
involvement in cyberbullying had increases odds of depression and alcohol use and those who
were actually victims had an increased odd of depression (Selkie et al., 2015).
Cyberbullying can also have a sexual element, even with adolescents, and have a more
damaging effect such as self-harm and suicidal ideation (Coburn, Connolly, & Roesch, 2015).
Hamm et al., 2015, also did extensive research on what the impact of cyberbullying on an
adolescent’s psychological state was but their research consisted of analyzing many research
studies that were already done in this area. They used 11 databases with a 12-year span dated
from January 1, 2000 until January 14, 2012 and by using two independent reviewers, were able
30
to include the studies that reported primary research, evaluated the use of social media in the
context of cyberbullying and included children or adolescents (Hamm et al., 2015). The
researchers were able to locate 36 studies that matched their criteria. A majority of the
percentage of 23. Among these studies, five reported consistent correlation whereas the other
five reported a weak correlation between cyberbullying and anxiety. Ten of the studies found a
correlation between cyberbullying and depression and the five studies that researched suicide and
the link to cyberbullying found conflicting results (Hamm et al., 2015). This study was able to
show how inconsistent research has been in this area. The only positive correlation has been
with cyberbullying and the link with depression, but all other areas are contradictory.
The most significant research conducted on teens regarding cyberbullying is the link with
cyberbullying and suicide. Researchers Messias, Kindrick, and Castro, 2014, used data from the
2011 CDC Youth Risk Behavior Survey to study the relationship between regular bullying as
associated with depression and suicide and cyberbullying. The respondents of the survey were
high school students from grades 9-12 throughout the United States (Messeas et al., 2014). The
authors found that girls are more likely to report being bullied overall, especially cyberbullying,
then boys whereas boys are more likely to report being bullying exclusively at school (Messeas
et al., 2014). The authors also found that 2-week sadness and suicidality items are highest
among the teens that reported both cyberbullying and in school bullying (Messeas et al., 2014).
The authors stress the immediate need to place interventions to prevent both forms of
cyberbullying and they also stress the importance of screening for depression and suicidal
thoughts of those teens who report being either cyberbullied or bullied at school (Messeas et al.,
2014). Adolescent cyberbullying victims tend to display lower self-esteem, higher depression,
31
and higher loneliness and self-esteem, depression, and loneliness are thought to be interrelation
Unfortunately, many of the current research articles have contradictory findings when
trying to find the link among cyberbullying, depression, anxiety, and suicidal ideation in
adolescents. There is also a lack in research to why someone may cyberbully someone else. One
popular theory as to why someone may cyberbully another is Theory of Planned Behavior, which
proposes that a person’s behavior is reflected by three variables including subjective norms,
Theory of Planned Behavior, 2017). After testing this theory, researchers found that the only
variable that tested true was the effect of subjective norms on the intention to cyberbully where
the other variables were not considered to play a part in the intention to cyberbully. This is
important to many adolescents and when they encounter all forms of cyber-insults, it can lead to
However, other researchers conclude that it is actually Social Information Processing Theory
which suggests that aggression is due to impairment of social problem solving (Bauman, Cross,
& Walker, 2015). And yet another theory that researchers believe is the reason one may
cyberbully is the General Strain Theory. The General Strain Theory states that individuals who
experience strain will take that and convert it to aggression thus leading to acts such as
safe behavior intentions and cyberbullying victimization (Doane et al., 2016). A study was
response efficacy, and self-efficacy regarding electronic communication safe behavior would
32
have a positive effect on communication safe behavior intentions, (2) that electronic
communication safe behavior intention would be negatively related to online risky behavior, and
(3) that electronic communication risky behavior would be associated with cyberbullying (Doane
et al., 2016). Results show that three out of the four PMT items were actually related to risky
behavior including perceived severity, response efficacy, and self-efficacy (Doane et al., 2016).
Other researchers aimed at finding how being the victim of cyberbullying relates to
internalizing and externalizing problems and found that there is a significant relationship
between peer cybervictimization and internalizing and externalizing problems however it still
does not explain why they may become a victim (Fisher, Gardella, & Teurbe-Tolon, 2016).
However, another researcher did find that maternal attachment anxiety could be an early warning
sign for either cyberbullying victimization or offending but was not clear as to which one
(Varghese & Pistole, 2017). If it is a risk factor for either being the victim or the offender, it
does not lead to a conclusive finding that would help further research in the area of why someone
would become a victim. The research also had huge limitations as most of the actual
Knowing the meaning of cyberbullying is important when conducting research on it. Many
researchers describe cyberbullying in different ways and it is beneficial to use the multiple
definitions in any future research. Since cyberbullying has been studied frequently in
adolescents, using the findings to help guide research on adults can also be beneficial.
The following section of literature review will look at the evolution of cyberbullying.
Some of the earliest research articles try to define cyberbullying. Early studies defined
cyberbullying as willful and repeated harm inflicted through electronic text however, as
33
technology advanced, other forms of electronic communication were added into definitions of
cyberbullying (Patchin & Hinduja, 2015). However, bullying has been around way before
cyberbullying was even close to causing problems in peoples’ lives. Schoolyard bullying has
been growing over the past thirty years (Hendricks, Lumadue, & Waller, 2012).
Before technology was an option, bullying would consist of the traditional, or face-to-
face, type of harassment. There is even an evolutionary trend from elementary school through
adulthood. In elementary school, children may name call or hit each other but since they have
limited access to electronic devices, and when they do it is for educational programs, it generally
stays with the traditional bullying (Hendricks et al., 2012). As they move into middle school and
high school, they are given the opportunity to possess cell phones and they are given access to
computers with more freedom to interact with different websites (Hendricks et al., 2012).
Recently, cyberbullying has moved into the workplace. Before cyberbullying, however, there
was also traditional bullying in the workplace. During the 1990s, this type of bullying was
Since most work places are more hi-tech, evidence has shown that cyberbullying is the
preferred type of harassment among employees now (Piotrowski, 2012). Cyberbullying can even
abuse (Piotrowski, 2012). However, one may ask how prevalent is cyberbullying in the
workplace? A survey conducted by multiple universities showed that 8 out of 10 people have
experienced cyberbullying in the workplace within the last 6 months which shows a trend is
Cyberbullying can also stem from people getting involved in risky online behavior either
in the workplace or with co-workers. The four main types of risky behavior include sharing
34
sharing videos of risky pranks, and engaging in sexual communication with strangers (Branley &
Covey, 2018).
When looking at how research has evolved for bullying and cyberbullying, researchers
Zych, Ortega-Ruiz, and Del Rey, 2015, reviewed 309 articles that studied this phenomenon.
Their research found that the highest percentage of articles that were published early on focused
on the nature and dynamics of bullying whereas later studies on bullying and cyberbullying
focused on the related variables (Zych et al., 2015). Also, only a few highly cited articles
focused more on the involvement of minorities in bullying and even less looked at prevention
How adults cyberbully. There is a fine line between a co-worker who jokes around at
the expense of another co-worker and workplace cyberbullying. There is also a difference
between workplace cyberbullying and traditional workplace bullying (Zhang & Leidner, 2018).
In face to face bullying, the bully is able to see the damage they are doing as it occurs but in
workplace cyberbullying, they are able to inflict damage with being copresent (Zhang & Leidner,
2018). Not only are the bullies able to conceal their identities, but they are able to reach a larger
social media or spreading rumors about a colleague at a company party (Zhang & Leidner,
2018). Workplace cyberbullying exposes employees to negative treatment from supervisors, co-
workers, or subordinates by electronic form and can also include insulting remarks, and repeated
criticism of an employee’s errors (Zhang & Leidner, 2018). There are two main electronic
devices that are used by cyberbullies including computers for email or access to website and cell
35
phones for text messaging and calls (Privitera & Campbell, 2009). They can also use multiple
outlets to attack a co-worker and can include e-mail, social media, text messages, etc. Written
intentionally excluding the full diversity of viewpoints that may have been expressed earlier in
Workplace cyberbullying also consist of three types of behavior including person related,
work related, and intrusive (Vranjes et al., 2017). Person related, and work related correspond
with any distinctions made in workplace bullying literature and refer to acts that respectively
target a person and make that person’s job difficult to perform (Vranjes et al., 2017). Work
related behaviors can include not sharing work-related information online and intrusiveness can
include invading a person’s privacy and making them feel pursued (Vranjes et al., 2017).
Why adults cyberbully. When it comes to adolescents, they are vulnerable to being a
cyberbully or being cyberbullied because they are not fully capable of understanding what the
relationship between a persons’ behavior is and the consequences to their behavior (Cohen-
Almagor, 2018). They also lack adequate ability to understand and weigh dilemmas, evaluate
their choices, and make sound decisions (Cohen-Almagor, 2018). However, victims of
cyberbullying, as well as witnesses, may wonder why an adult would cyberbully. Social learning
theory has been successful is trying to understand why people may cyberbully. This theory
explains and recognizes the nature of the bully and focuses on the behavioral aspect, cues, and
Social cultural theory has also been used to understand why adults cyberbully because it
suggests that bullying is a consequence of power differences in different social groups (Ashiq et
al., 2016). Other findings of what makes a cyberbully show that they come from troubled homes
36
and have a hard time fitting in (Ryan, 2016). By cyberbullying, they are compensating for their
own insecurities and shortcomings by attempted to assert force as well as inflict pain on co-
Workplace bullies tend to be outliers without close family and no friends and in an
attempt to undermine those that they are threatened by, they prey on the weak (Ryan, 2016). The
bullying, and this is thought to have an effect on how goals for these types of actions are formed
and pursued (Dooley et al., 2009). It was even found through studies that bullies find it easier to
There are psychological predictors that are present in cyberbullies (Ashiq et al., 2016).
Some of the predictors include lack of empathy, less empathic responsiveness, depression,
anxiety, and behavioral problems (Ashiq et al., 2016). These predictors are some of the reasons
that can drive someone to commit the act of bullying. Males are also more prone to cyberbully
because behavioral problems are usually higher in males (Ashiq et al., 2016). The Barlett
Gentile cyberbullying model has also been used to describe cyberbullies and is a social-cognitive
model that elucidates the psychological process involved with cyberbullying perpetration (Barlett
& Kowalewski, 2018). One of the key elements to this model is that it suggests that learning, via
the act of cyberbullying, leads to the development of perceptions of anonymity and the belief that
one’s muscularity is irrelevant in the online world which therefore leads to subsequent
cyberbullying perpetration (Barlett & Kowalewski, 2018). According to The Barlett Gentile
attitudes and one of these attitudes is believing that cyberbullying is the most appropriate method
to cause harm on someone (Barlett & Kowalewski, 2018). Also, many victims of face-to-face
37
bullying resort to being the perpetrator of cyberbullying as a form of retaliation (Lazuras et al.,
2017).
A person’s personality is also a factor in trying to understand why a person would bully
another. Research has found that there are five factors that are used to gauge personality that is
consistent with being a bully. These factors include extraversion, agreeableness, neuroticism,
openness to experience, and conscientiousness (Wilson & Nagy, 2017). A bully may
demonstrate a lower score in extraversion because they have difficulty engaging in new activities
or talking to people they do not know (Wilson & Nagy, 2017). A bully would also score low on
agreeableness because they are unlikely to be courteous as well as be abrasive in nature (Wilson
& Nagy, 2017). However, a bully would likely score high on neuroticism because people who
demonstrate neuroticism usually have high level of stress and anxiety (Wilson & Nagy, 2017).
They would generally score high on openness to experience because they are likely to be
unhappy with repetitive experiences and the bullying would be something new for them (Wilson
& Nagy, 2017). Also, a bully would generally score low on conscientiousness because these
types of personalities are usually diligent and timely in their tasks and take on a great deal of
responsibility (Wilson & Nagy, 2017). Emotional stability is also a factor in determining why
someone would cyberbully another. Anger, fear, and sadness have been the three most
substantive emotions when determining tendencies (Vranjes, Baillien, Vandebosch, Erreygers, &
De Witte, 2018). Anger can lead a person to act out against another and fear and sadness in
victims caused by the bully can make the perpetrator feel powerful therefore giving them
The victim’s characteristics can also dictate why someone would cyberbully another.
Women are more likely to be cyberbullied then men (Samnani & Singh, 2016). Older employees
38
tend to be cyberbullied more than younger employees (Samnani & Singh, 2016) Ethnicity also
has been found to be a factor. Those of ethnic backgrounds are more likely to be cyberbullied
A theory that has been applied to victims and why they are cyberbullied is Victim
Precipitation Theory. Victim precipitation Theory suggest that employees that appear more
vulnerable will tend to precipitate cyberbullying behavior from others and when an employee is
of a minority group at an organization, they may appear more vulnerable (Samnani & Singh,
2016). Victims of cyberbullying have been shown to have parents with higher parental stress
who used more of a permissive education style when they were growing up as well
and destructive and further subdividing into passive and active roles (Hellemans, Dal Cason, &
Casini, 2017). When it comes to cyberbullying, it does not just affect the victim but bystanders
as well. There also many factors that determine whether a co-worker would even defend their
colleague if they were to witness them being cyberbullied. Low moral disengagement, anti-
social conformity, high perceived control, and bad relationships with bullies were all found to
have links with high defending tendencies (Song & Oh, 2018). Co-workers are also more likely
to defend victims where there is a lack of other bystanders (Song & Oh, 2018). However,
bystanders may be hesitant to defend their co-worker for fear of being the next victim or lack of
effective countermeasures (Song & Oh, 2018). Low self-efficacy by the bystander is also a
precursor of the fear to intervene, along with external attribution (Hellemans, Dal Cason, &
Casini, 2017).
39
The relationship between the victim and the bystanders is also an indicator of the
likelihood that the bystander will intervene. When co-workers are close to the victim, they are
more likely to exhibit helping behavior such as defending the victim and social support (Brody &
Vangelisti, 2016). However, victim’s friends are usually only limited to low-profile support
because a perpetrator will purposely intensify his or her attacks against those victims that are
Social identity was yet another factor that determines if a bystander steps in. If the victim
was part of the bystanders “in-group” they are more likely to defend them (Brody & Vangelisti,
2016). Lastly, because managers have authority over such things as performance appraisals and
promotions of all the employees, bystanders typically choose to tolerate the bullying behavior
out of fear that they will become the next victim (Wu & Wu, 2018).
Bystander’s issues start in early adolescents. Research has shown that individuals choose
peers who were similar in bullying and became more similar to friends in bullying over time, but
this is only present in early adolescence (Sijtsema et al., 2014). There was also evidence that
friends’ influence was stronger in young adolescents that displayed higher moral disengagement
and bullying was also indirectly influenced through friends’ moral disengagement (Sijtsema et
al., 2014). Lastly, young adolescents maintained friendships with peers who were similar in
Cyberbullying has evolved quickly just as technology has. There are also a great deal of
factors when analyzing cyberbullying. It is not only important to know how adults cyberbullying
or why they cyberbullying one another but knowing the perceived effects to the bystanders is
The following section of literature review will look at legal issues with cyberbullying.
Little is known about the legal implications of cyberbullying however, it can fall into many
categories of law that are already in place. Every location is different, so it is important to know
what the local laws are regarding this offense. For example, in the UK, there are many statutes
that cyberbullying could fall under (El Asam & Samara, 2016).
One of these laws include Protection from Harassment Act 1997 which outlines that a
person is prohibited from conducting behavior that amounts to harassment (El Asam & Samara,
2016). Another of the laws is the Malicious Communications Act 1988 which says that sending
letters with an intent to cause distress or anxiety is against the law (El Asam & Samara, 2016). It
is further detailed that it is an offence for someone to send electronic communications that are
offensive, contain false information but further details that the person sending the message has to
be intentionally trying to cause distress to the recipient and not if the communications were made
In the United States, one of the most prevalent measures thus far have actually been
legislative intervention in bullying and cyberbullying but studies that focus on the effectiveness
of legislation are still pending (Yang & Grinshteyn, 2016). Also, in the U.S., bullying is
primarily addressed at a state level because states are what deal with it through criminal statutes
however the U.S. Constitution does play a role in that potentially harmful speech may be
protected under the First Amendment (Yang & Grinshteyn, 2016). All states in the U.S. have
issued some type of bullying legislation and even though each state may differ, 47 out of 49
states with bullying legislation also have an electronic harassment listed as a form of bullying
When looking and decided legal options in order to address cyberbullying someone may
evidence to satisfy any of the many laws (El Asam & Samara, 2016). This can be done by
electronics evidence and a trail of messages which would prove crucial in a court of law
specially to prove harassment or stalking (El Asam & Samara, 2016). There are steps that the
victim can take before resulting into legal action, however. These include having material
removed from the website, and having a user removed from the site and retrieving the images (El
Asam & Samara, 2016). Since cyberbullying falls under a form of bullying, it is also important
to know the laws in regard to bullying in the workplace. California was the first to introduce the
Healthy Workplace Bill which addressed workplace bullying and even though the bill died in
Another state that took cyberbullying seriously was Tennessee. In 2014, Tennessee
enacted a statute directing a state commission to come up with a workplace anti-bullying policy
for state, county, and local governmental entities to adopt (Yamada, 2015). This policy would be
used to assist employers on how to recognize and act to abusive conduct in the organization as
well as prevent retaliation against employees that have reported abusive behavior in the
organization (Yamada, 2015). The governor of New Hampshire, however, vetoed the bill that
would have required any state employers to adopt a policy for workplace bullying because it
Cyberstalking is the use of electronics to harass or threaten others (DeMatteo, Wagage, &
goes beyond just the harassment of others and can progress to threats of harm. Cyberstalking is
common in domestic violence victims and it strips them of two essential tools that traditionally
The first tool lost by victims is the ability to prosecute and the second tool lost is the
ability to obtain or enforce civil protection orders just on the basis of cyberstalking (Shimizu,
2013) A study by DeMatteo et al. (2017) compared the laws with public perception and asked
participants what would be acceptable punishments for cyberstalkers. The punishments that the
participants agreed are acceptable in order from highest percentage of participants choosing that
form to least include restraining order, paying court fines, probation, compensating the victim,
incarceration, banning the cyberstalker from using the internet, providing treatment, and banning
the cyberstalker from even using a computer (DeMatteo et al., 2017). Although almost every US
state has enacted cyberstalking laws, there seems to be a variation of definitions, scope, provided
protections, and punishment compared to what the participants views are (DeMatteo et al.,
2017).
There are also several issues when deciding to bring legal action against a bully or
cyberbully. The first issue is that police officers are usually not experts in technology thus
intervening online may not be prevalent (Samara et al., 2017). The next problem is financial cost
which is the major reason why cases of bullying never reach court (Samara et al., 2017).
Another issue is focused on jurisdictional problems because the cyberbullying could be taking
place in another country with completely different laws, so the victims are only partly protected
by the law (Samara et al., 2017). This can still happen in the workplace as many companies have
behavior is likely to discourage disclosure and only the most egregious incidents are likely to be
43
reported (Coburn et al., 2015). Many of the incidents will be undetected and both the victim and
the perpetrator will be left to deal with the consequences without any help (Coburn et al., 2015).
Since every location in the world is different in regard to their laws, it is important to
know what the local laws are regarding cyberbullying. Little is known about the legal
implications of cyberbullying however, it can fall into many categories of law that are already in
place. Victims also should be aware of what the laws are and what options they have to
Reporting Cyberbullying
The following section of literature review will look at the process of reporting
cyberbullying. Very little research has been conducted on the responses to cyberbullying
incidents by the victim or what the actions were by managers, teachers, police, etc., if
cyberbullying was reported (Addington, 2013). Research has shown a positive relationship
between the seriousness of the incidents and reporting it (Addington, 2013). There were also
patterns that show that females and frequent victims are more likely to report affect local
A common mistake that victims make are that they fail to report the cyberbullying to
their manager or supervisor and they perceive that electronic communication is not traceable, so
they do not think they can report it (Hendricks et al., 2012). However, underreporting
cyberbullying by victims can result in misallocation of resources (Addington, 2013). There are
many factors of why someone may not report the incidents of cyberbullying. These factors can
include lack of awareness or underestimating the effect that cyberbullying can have, fear of
44
others’ reactions, or the desire to just deal with the problem themselves (Gao, Zhao, &
McJunkin, 2016).
a significant effect on the employee and the outcome of the situation. It is also important that
employers are trained in these types of issues so that proper implementations of policies can be
carried out. Legislation has made requirements that employers have an increased recognition
that workplace bullying is a major job stressor (Snyman & Loh, 2015). Without identifying
polices or procedures for cyberbullying, organization leave themselves susceptible to legal issues
the employer is automatically held liable for the supervisor’s actions if the actions dealt with loss
of wages, failure to promote, termination, etc. (Pastorek et al, 2015). The employer is also held
control or knew about it and failed to take immediate action (Pastorek et al., 2015).
and other forms of harassment. Several companies in the health care field set up intervention
programs to aide employees in learning cognitive rehearsed responses and when to use them as
defenses if they were in a bullying situation (Pastorek et al., 2015). Another response can
include stress management training. The goal of stress management training is to provide
employees ways to handle bullying and stressful situations (Pastorek et al., 2015). It is also
essential in having a Human Resources Department that is trained in these types of programs and
can enforce any policies that were set up within the organization (Ritzman, 2016).
bullying (Fox & Cowan, 2015). Such difficulties can include conflicts between multiple human
45
resource roles within an organization, a paucity of specific policies and guidelines for dealing
with a bullying situation, and ambiguous definitions and criteria for what behavior can actually
be considered bullying (Fox & Cowan, 2015). Lastly, organizations should have ways in which
to measure the prevalence of bullying. One way to measure this would be self-identification by
targets in which the targets are supplied with a definition of workplace bullying and then asked
to identify if or how often they have experienced it (Fox & Cowan, 2015). Another way would
be checklists of specific bullying behaviors with definitional criteria that is given to the victim to
Workplace policy. Employers need to have policies put in place to combat the
Negative perceived effects that bullying in the workplace can cause. One policy that can be
precise on the position of the organization on cyberbullying, define what the organization says is
cyberbullying (Snyman & Loh, 2015). Another policy that organizations should implement is a
hiring strategy. This strategy would include screening techniques to identify possible bullying
tendencies in applicants (Pastorek et al., 2015). These tendencies would include contacting prior
employers and asking about the applicant’s reliability, honesty, personality, obtaining criminal
records as well as asking about gaps in employment history (Pastorek et al., 2015).
A third policy that can be placed in the workplace is an anti-bullying policy. An anti-
bullying policy is similar to a zero-tolerance policy. There should be a clear commitment to the
absence of bullying in the workplace, a description of what bullying is, repercussions for
noncompliance, what the responsibilities are of the various stakeholders, assertion that the policy
will be enforced consistently and across the spectrum, and a non-retaliation policy included
46
(Ritzman, 2016). The policy should also be reviewed regularly to ensure that it is effective and
being communicated efficiently to all employees and training and awareness programs should be
Lastly, an organization can choose to implement a human resource policy. Strategies for
a human resource policy would include: communicating the policy to each employee; making
sure all employees remain aware of the policy; listen to employees in order to gauge the
organizational climate; provide specific negative and positive examples of action considered
unacceptable; maintain ethical guidelines on the usage of social media, email, text messaging, or
any other forms of communication; outline penalties for anyone who violates the policies; create
an inclusive disciplinary process and resolution training (Hall & Lewis, 2014). Having a human
resource department that is knowledgeable on all policies is very important to the organization.
Unfortunately, victims of workplace bullying often perceive human resource staff application of
Very little research has been conducted on the responses to cyberbullying incidents by
the victim or what the actions were by managers, teachers, police, etc., if cyberbullying was
reported (Addington, 2013). How employers handle cyberbullying can have a significant effect
on the employee and the outcome of the situation. Employers need to have policies put in place
to combat the negative perceived effects that bullying in the workplace can cause. Also,
management must be quicker in identifying any issues that affect employees within a department
which include traditional bullying and cyberbullying as well as personal conflicts and take action
against these issues to ease tension within a department or organization (Trad & Johnson, 2014).
47
Solutions to Cyberbullying
The following section of literature review will look at the solutions to cyberbullying that
have been proposed by researchers. Prior research has found that IT, or Information Technology,
features can create a strong cyberbullying opportunity for those people who perceive that they
are being controlled by others and can create a sense of vulnerability which leads them to engage
in cyberbullying (Lowry et al., 2017). Based on this finding, it is thought that other specific IT
design features can also be created to discourage cyberbullying (Lowry et al., 2017). One design
feature that has been created automatically detects cyberbullying entries on the internet by using
seed words from three categories in order to calculate a sematic orientation score and then
Cyberbullying prevention, however, must start in the schools. Some current remedies
that schools have implemented include denied access to the internet for the students, hiring a tech
company to monitor and track the students’ online activity including communications, and
texting programs that gives a way for the students to text school administration with any
cyberbullying incidents that may have occurred (Choo, 2015). Other models have been created
for social media sites such as Twitter that use a machine learning classifier for classifying all of
the tweets as cyberbullying or non-cyberbullying (Al-garadi, Varathan, & Ravana, 2016). Even
though prevention starts in schools, education needs to be directed towards the general
population (Samara et al., 2017). This is important to accomplish because it will ensure that
everyone is aware of what the definition of cyberbullying is, what the consequences are, who is
responsible for combating it, and what the most effective way to stop it is (Samara et al., 2017).
This education can be constructed to include skills training for the loved one of victims, legal
48
training for employers, technology training for police officers, and coping strategies for the
Another way to prevent cyberbullying is if social media designers focus on safety, are
supportive, are responsible, and are constructive while monitoring their sites (Lowry et al.,
2017). Raising awareness of the significant impact cyberbullying can have on a person is critical
(Choo, 2015). Internet Service Providers, or ISP, should offer easy to use safety features on their
servers and net users should be able to remove content off of their own pages that is undermining
or damaging to their reputation (Cohen-Almagor, 2018). Social media sites such as Facebook
should add noticeable buttons on peoples’ walls that enable them to easily seek professional
assistance when experiencing abuse (Cohen-Almagor, 2018). ISP could also provide uniform
channel for any user that would like to make a complaint (Cohen-Almagor, 2018).
Some researchers have proposed solutions to cyberbullying. The first solution starts with
IT. Specific IT design features can also be created to discourage cyberbullying (Lowry et al.,
2017). Schools are another option. Schools can use denied access to the internet for the
students, hiring a tech company to monitor and track the students online activity including
communications, and texting programs that gives a way for the students to text school
administration with any cyberbullying incidents that may have occurred (Choo, 2015). Lastly,
Internet Service Providers, or ISP, should offer easy to use safety features on their servers and
net users should be able to remove content off of their own pages that is undermining or
Summary
Traditional bullying in the workplace has become an easier task for the bully by offering
49
anonymity so that one can harass co-workers by denigration, verbal fights, cyberstalking,
exclusion, pretending to be someone, and outing (Smith, 2015). The co-worker, or bystander is
Chapter 2 was an extensive review of the literature and research related to cyberbullying
in the workplace. The chapter was divided into sections that include: Moral Disengagement
Theory, Theory of Planned Behavior, differences between traditional bullying and cyberbullying,
The chapter continued with how adults cyberbully, why adults cyberbully, co-workers as
The purpose of this qualitative study is to explore the impact that cyberbullying has on
adults in the workplaces. The subject of cyberbullying demands increased attention because of
the physical danger it poses to victims as well as psychological and behavior issues associated
with it (Yang & Grinshteyn, 2016). Two theories provide the foundation for this study of
cyberbullying in the workplace. These theories include Albert Bandura’s Moral Disengagement
Theory and Icek Ajzen’s Theory of Planned Behavior. Both theories play a role in
place to help the victims so that they may continue to work in peace. Even though there has been
extensive research in the area of bullying, cyberbullying is a new phenomenon with the
adolescents, however, there remains a gap in research for adults in the workplace who fall prey
50
to cyberbullying. Chapter three will continue with the research methodology used in this study
as well as the population and sample, materials and instrumentation used, procedures, data
The problem addressed by this qualitative descriptive study is that adults in the
workplace are being affected by cyberbullying. The general problem is that as technology
advances, common forms of bullying are also advancing. Bullying has moved to an anonymous
form known as cyberbullying; and ease of use makes it that much more popular as a means of
harassment. Cyberbullying comes in many forms and can include denigration, verbal fights,
cyberstalking, exclusion, pretending to be someone, and outing (Smith, 2015). Once only
thought to be a problem amongst adolescents and young adults, cyberbullying has moved into
the workplace, affecting not only the employees but the employers as well. The specific problem
is that the impact of cyberbullying on adults in the workplace are not known.
The purpose of this qualitative study was to explore the impact that cyberbullying has on
adults in the workplace. This chapter describes the descriptive qualitative research methodology
and design which is proposed to gain an understanding of how employees perceive the
experience and effects of cyberbullying in the workplace. This chapter will also describe the
procedures, data collection and analysis, assumption, limitations, delimitation, and ethical
A qualitative research method was used in this study. The qualitative method is suitable
because it can produce a description of the participants’ feeling, opinions, and experiences, as
well as interpret the meaning of the participants’ actions (Rahman, 2016). Qualitative research is
an inquiry approach that is useful for exploring and understanding a phenomenon (Al-Busaidi,
2008). Qualitative research is also important when studying a subject such as cyberbullying
52
and interpretive techniques of trying to understand human behavior (Rahman, 2016). There are
specific steps that should be followed when conducting a qualitative study. First, the researcher
asks the participant broad questions, collects the detailed views in the form of words or images,
analyzes the data for description or theme, and lastly interprets the meaning of the information
by drawing on personal reflections as well as past research (Farber, 2006). The questions in this
study was asked by supplying the participants with open ended surveys.
quantitative would not be appropriate for this type of study because quantitative research elicits
motivation is required (Barnham, 2015). If the study were trying to gauge if cyberbullying were
a real epidemic and wanted to find just how many people may be experiencing it, then a
quantitative study would be sufficient but since the study aims to find what the perceived effects
A descriptive design is suitable for use in research where a more naturalistic inquiry is
needed such as when studying workers’ natural response to cyberbullying (Lambert & Lambert,
2012). Descriptive research was used in this study to obtain information concerning the current
status of cyberbullying in the workplace and what exists with respect to variables or condition in
this situation (Colorafi & Evans, 2016). Descriptive studies collect larger amounts of data in
order to produce a detailed analysis as well as yielding rich data that can lead to an important
There are also other types of designs available for researchers. Although a descriptive
design was used for this study, other designs include case studies, phenomenology, and narrative
53
research. Case studies are used in research where the researcher has a case that is bounded by a
time or place that can inform the researcher of the problem (Creswell, Hanson, Plano Clark, &
Morales, 2007). In this study, the problem investigated is not found in a bounded situation but
exists in a diverse set of work circumstances. The type of problem for which case studies are best
suited are when the researchers need an in-depth understanding of a case or cases and the focus
of case studies is to develop an in-depth description and analysis of a case or cases (Creswell,
2006).
(Creswell, 2006). Phenomenology is best used when the researcher seeks to understand a lived
experience of a person (Creswell et al., 2007). This would be appropriate for this study however
phenomenology is better used when the researcher needs to describe the essence of a lived
phenomenon and in this study, the aim is to explore the details of the issue in cyberbullying
(Creswell, 2006).
Lastly, narrative research is an option when deciding which research design to use.
Narrative research uses detailed stories to tell a problem (Creswell et al., 2007). However, much
of narrative research is the participant retelling the story and cyberbullying would be best told as
it is being experienced. Narrative research focuses on exploring the life of an individual whereas
this study is primarily focused on the work aspects of an individuals’ life (Creswell, 2006). For
these reasons a qualitative descriptive study method and design were identified as most
The general population for this study consists of any worker in the United States that is a
current victim or witness of cyberbullying at the job in which they identify as being cyberbullied.
54
The target population sample included both male and female workers between the ages of 21 and
65 within the population of U.S. workers currently being cyberbullied or witnessing it in the
workplace.
Participants were sampled until data saturation had been reached. Data saturation in
qualitative research is an important objective on which to focus when deciding what the
population and sample will consist of. In order to achieve data saturation, there should be
enough data in order to replicate the study and further coding is no longer possible (Fusch &
Ness, 2015). Data saturation occurs when no new information can be found among the
participants (Given, 2008). However, failure to reach data saturation hampers content validity
(Fusch & Ness, 2015). The sample in this study contains a sufficient amount to demonstrate the
perceived effects of cyberbullying on workers but not too many that the participant’s answers are
monotonous. The number of participants, 21, was used in this study to avoid redundancy in their
answers.
A purposeful sampling procedure was used to find and select the sample for this study.
Purposeful sampling involves identifying and choosing individuals that are knowledgeable and
have experience with cyberbullying (Palinkas et al., 2015). The reason that purposeful sampling
was used in this study is that information-rich participants will provide insight to
cyberbullying (Palinkas et al, 2015). Purposive sampling was used to aide researchers in
identifying and choosing participants who had experience being cyberbullied and who are
willing to engage in open-ended surveys about their lived experience (Willis, Sullivan-Bolyai,
Participants were recruited via posts to Facebook groups and a survey site titled
SurveyMonkey. The post indicated that there is a need for participants that are either victims
55
of or witnesses to cyberbullying for a study being conducted to find the perceived effects of
cyberbullying on adults in the workplace. The participants must be current victim or witnesses
of cyberbullying at the job in which they identify as being cyberbullied and be between the ages
of 21 and 65. The post on Facebook sent them to a screening questionnaire on SurveyMonkey.
The post was displayed on pages that are geared towards workplace bullying after receiving
permission from the page administrators to post on their pages. If the participants were eligible,
they were then given the informed consent followed by the open-ended questions. Their
organization where they currently work as well as being between the ages of 21 and 65.
Materials/Instrumentation
The primary tool for data collection in this study was (2) semi-structured questionnaires
questionnaire asked about experiences of cyberbullying while the other questionnaire asked
Questionnaires are a common instrument when trying to collect data from participants and aim to
seek the opinion of individuals that are directly related to the objective of the study (Yaya, 2014).
Advantages of using a questionnaire in research studies are anonymity of the participants, the
researcher can collect a large amount of data in a short amount of time, and it can cost less than
to researchers. They allow participants to not only include more detailed information but also
explain if they do not understand or have an opinion about a question (Colorado State University,
2018). Open ended-questions also limit response errors because the participants cannot just
56
answer any choice. An example of this would be if they were to answer no for all of the
questions in a closed-ended survey without even reading it (Colorado State University, 2018).
Lastly, open-ended questions allow for obtaining extra information from the participant which
can be used more readily for secondary analysis by other researchers (Colorado State University,
2018).
Semi-structured questionnaires with open-ended questions are also suitable for use in
studying cyberbullying. The open-ended questions can reassure the researcher that all issues
have been covered and may increase response rates (O’Cathain & Thomas, 2004). A qualitative,
open-ended questionnaire will provide extensive information that pertains to the participants’
viewpoints and experience of a certain area or topic (Turner, 2010). Open-ended questions allow
participants to add as much detailed information as they wish to and also allows the researcher to
ask probing questions as a way to follow-up (Turner, 2010). This descriptive qualitative study
Prior to administration of the questionnaire, it was essential to conduct a field test of the
questionnaire that was administered to a group of sample participants to ensure that the
participants understood the questions as well as gave honest feedback on the questionnaire
design (Mcleod, 2018). The author used the field test in order to avoid inadequate or unrelated
answers and ensure validity. Procedures were also put in place in order to ensure reliability
within the study. Administering identical questionnaires for the victims and identical
questionnaires for the witnesses will ensure internal reliability. Finally, QDA Miner and
Wordstat software will be used to process and analyze the data because it has several tools to
partially or fully automate analysis of participant’s responses and identify any themes or patterns
Study Procedures
After approval was obtained to conduct the study from NorthCentral University’s
Institutional Review Board (IRB), the study began with 20 participants but did not exceed 25.
Participants were invited to take the online open-ended questionnaire via postings on Facebook
that lead the participant to a screening questionnaire on SurveyMonkey and if they qualified,
they were given the informed consent and the questionnaire. The post indicated that there is a
need for participants that are either victims or witnesses to cyberbullying in the workplace. The
post also indicated that the research is for a study of cyberbullying of adults in the workplace and
these posts were placed on Facebook pages that are geared towards workplace bullying with the
consent of the page administrator. Any participants that were referred by other participants were
able to contact the researcher to obtain the link to the data collection materials via the Facebook
messenger application or email which was provided to all participant at the start of their
organization where they currently work and being between the ages of 21 and 65 were met, the
survey continued to the informed consent page. External validity was achieved by using both
sexes, a large age range (anything over 21), and any economic class. Each questionnaire,
including the criteria questions, was estimated to take approximately 30-45 minutes to complete.
All questionnaires were administered online with an option to submit when complete.
The program, SurveyMonkey, automatically emailed the researcher once the participant has
submitted the questionnaire. Once questionnaires were received, they were downloaded
manually on a computer and stored in a folder with the participants’ alias on it.
58
reduce the risk that the conclusion will show only the systematic biases or limitation and also
allows the researcher to gain a broader understanding of the issue (Uwe, 2018). When the data
was analyzed, answers from each group were compared to determine if there is an agreement
Coding was used to find any patterns in the participants’ responses. The responses were
analyzed and grouped to determine the different themes using such factors as word repetition and
key words. Analysis of the data included using an open coding method. Open codes use and
apply codes that evolve from the text (Erik, 2016). QDA Miner and Wordstat software were
used to process and analyze the data because it has several tools to partially or fully automate
analysis of participant’s responses and identify any themes or patterns without reading the
The first step was to read through the participant responses and create categories based
on the findings. The second step was to label the responses with the categories previously
created and then identify any patterns. Lastly, an analysis was done by summarizing the patterns
that were previously identified. Researchers have debated on whether it is more beneficial to
open code by going line-by-line or by similar events, actions, interactions, etc. (Erik, 2016). For
this study, similar events, actions, and interactions were used to code the responses and there was
a constant comparison of data and categories throughout the analysis (Erik, 2016).
Assumptions
behavior (Hagger & Chatzisarantis, 2009). In this study, it was assumed that the sample will be
assumed that the participants’ responses were honest and complete, and the accurateness of their
answers will reveal their actual and true lived experiences. It is also assumed that all participants
have either been a victim of cyberbullying or witnessed it in the workplace. The findings and the
Limitations
The number of victims of cyberbullying and those who witness it is limited as compared
to the general workforce population. Even though cyberbullying among adults is growing as
technology advances, having someone recognize that what they are experiencing, or witnessing,
is actually cyberbullying may be hindered. Many of the employees who may have experienced
severe forms of cyberbullying may have resigned from the job that they were experiencing it at.
However, to get the most current recollection of how it effects the participant, using employees
maintain accuracy within the answers. Participants’ answers to the questionnaire may also be
place at organizations resulting in the participants’ lived experiences not being correctly
expressed. The participants were informed that the questionnaire is completely anonymous so
that the participants are more apt to disclose important information without fear of the offenders
retaliating or fear of losing their job. Another limitation is how long participants are willing to
Delimitations
The proposed qualitative descriptive study was delimited by placing certain restrictions
on the participants. The criteria that was used to choose the participants for this study are as
follows: 1) they must be current victims or witnesses at the job in which they identify as being
60
cyberbullied, 2) they have to live in the United States, and 3) they have to be over the age of 21
Ethical Assurances
Ethical considerations are extremely important in a research study. Ethics in research are
the standards of conduct that distinguish between right and wrong and help determine the
difference between what acceptable and unacceptable behaviors are (Resnick, 2015). It is also
important to adhere to ethical guidelines in order for the public to support and believe the
research (Resnick, 2015). Also, for this study, broad searches were done of peer-reviewed and
scholarly articles in order to have an extensive knowledge of the topic which is also important
The process of collecting the data through open-ended questionnaires will not only
produce real-world observations but provide a breadth of coverage of several people so it is more
likely to obtain data based on representation then other approaches which can therefore be
generalizable to the population (Kelley, Clark, Brown, & Sitzia, 2003). The open-ended
questionnaires protocol that was approved by the IRB was followed. The explanations of the
study and what is involved was addressed in the informed consent. The participants were also
told that they can end their participation at any time with no reason and without fear of
Summary
The purpose of this qualitative study was to explore the impact that cyberbullying has on
adults in the workplace. This chapter covered the research methodology and design, population
and ethical assurances that are connected to this study. This qualitative study was conducted by
61
open-ended questions administered via an online survey. A descriptive design was used.
Workers who are currently being cyberbullied or are a witness to co-workers who are
the perceived effects of cyberbullying among adults in the workplace. The data that was
collected from these open-ended questions can be used by employers to administer policies and
Employees who are victims of and witnesses to cyberbullying were selected based on
their current job status. Employees and witnesses must be current victims or witnesses of
cyberbullying in an organization. A purposeful sampling procedure was used to find and select
the sample for this study. Participants were recruited by links to SurveyMonkey from postings
on Facebook. The number of participants, 21, was used in this study to avoid redundancy in
their answers. The primary tool for data collection in this study was open-ended questions
consisting of (2) 13 separate questions administered online. One questionnaire asked about
experiences of cyberbullying while the other questionnaire asked about experiences witnessing
cyberbullying. Participants received both questionnaires. Coding was then used to find any
patterns in the participants’ responses. The responses were analyzed and grouped to determine
the different themes using such factors as word repetition and key words. Analysis of the data
The questionnaires, collection, and security protocols that was approved by the IRB was
followed. The positive implications of this study may lead to a better understanding of
cyberbullying by employers and help in identifying cyberbullying that may be occurring in the
organization which can lead to policies and procedures being implemented to remedy
62
cyberbullying. Chapter 4 will continue with the findings that were obtained, validity and
Chapter 4: Findings
The purpose of this qualitative study was to explore the impact that cyberbullying has on
adults in the workplace. A descriptive qualitative study was implemented in order to gain an
workplace. A descriptive design was suitable for this study because a more naturalistic inquiry
was needed in order to study the workers’ natural response to cyberbullying. Thirteen questions
were asked of anyone identifying as a victim of cyberbullying and thirteen different questions
were asked to anyone identifying as a witness (see Appendix B & C). The main objective of the
two sets of thirteen questions was to address the following research question:
workplace?
coworkers?
This chapter presents the findings from the data collected by the online questionnaire.
The number of participants was appropriate for achieving trustworthiness because the study
but not too many that the participant’s answers are monotonous. The number of participants, 21,
The research method and design are reviewed including recruitment, sample size, and
emergent themes and subsequent finding for each question. The results of this study are
Trustworthiness of Data
A trial study was conducted by providing two experts with both sets of 12 questions.
This is important to ensure readability and that the participants will understand the questions as
well as give honest feedback on the questionnaire design (Mcleod, 2018). A trial study was also
The first reviewer mentioned that it was a timely issue and the participants sense of
confidentiality will be very important. It was also stressed that the demographics obtained
should not be perceived as identifiable. There were no recommended changes to the structure of
The second reviewer suggested either asking the participants what their definition of
cyberbullying is or having it defined for them before they started either survey. People may have
different views on what cyberbullying is so, this would help during the coding process. The
author added a question #13 that asked what each respondents’ view of cyberbullying was. It
was then suggested to change “when did you first notice”, to “when did you first become aware”.
That change was made. It was lastly suggested to add customer to the list of people who may be
the cyberbully. Since an employee can very well be cyberbullied by a customer, it was added to
the questionnaire. These changes were made in both the victim and the witness questionnaires.
phenomenon. In order to reach trustworthiness, researchers must support the argument that the
inquiry’s findings have value (Fabber, 2018). There are four major components to
2014). Credibility consists of staying in the field until data saturation is reached by using
prolonged engagement as well as persistent observation (Elo et al., 2014). In this study, the
65
credibility of the experience of workplace cyberbullying from the victims’ or the witnesses’
viewpoint was addressed in the (2) sets of 13 survey questions that were administered to all
participants. The questions were administered in the same format on the same website to address
the two research questions. Transferability is when research findings can be applied in the
contexts with other respondents (Elo et al., 2014). The participants in this research study ranged
from 21-65 years old and were from a variety of professional fields, supporting the
transferability of the findings to most age groups and settings. Dependability provides evidence
that if the study was replicated with the same or similar participants in the same context, the
finding would be the same (Elo et al., 2014). In this study, dependability was accomplished by
giving the same questions in the same format by the same researcher. Confirmability is the
degree to which the findings are the result of the focus of the inquiry and not the biases of the
researcher (Elo et al., 2014). In this study, trustworthiness was supported by developing two sets
of questions that were presented by the same researcher on the same website, one for victims,
and one for witnesses. The trustworthiness of the results are addressed in the procedure as part
of the research design. This was done by detailing the preparation, organization, and reporting
Participant recruitment
An invitation (see Appendix E) was posted on two workplace bullying Facebook pages,
Stop Workplace Bullies Now! and Workplace Bullying. Interested participants were asked to
click the link to the corresponding survey which consisted of one questionnaire for victims and
one questionnaire for witnesses. Before they were permitted to answer the questionnaire, they
were required to answer screening questions and meet the eligibility requirements as well as read
66
and agree to the informed consent (see Appendix F). The thirteen questions were then
cyberbullying and three participants that identified as being a witness of cyberbullying. One
respondent was found eligible but did not complete the survey and another nine respondents did
not meet the eligibility requirements. The inclusion criteria identified workers between the ages
of 21 and 65 who all live in the United States and identify as being either current victims or
Data collection
Prior to collecting any data, approval from the Northcentral University Institutional
Review Board (see Appendix A) was obtained. Themes, categories, and patterns were obtained
in order to find the relationship with the phenomenon so as to strengthen the validity of the
study. A step-by-step process was used in data collection including recruiting, data collection,
recruitment on the Stop Workplace Bullying Now! and the Workplace Bullying Facebook pages.
Interested participants could click on the provided links that corresponded to either being a
67
victim or witness to workplace cyberbullying. This link to them to the eligibility questions
currently work?
Eligible participants who responded yes to the screening questions were then provided
with an informed consent form to read and check off if they agree. Respondents who agreed to
the informed consent were directed to the appropriate 13 open-ended question survey, one for
victims of cyberbullying and the other for witnesses of workplace cyberbullying. The complete
survey responses were downloaded from Survey Monkey to a Microsoft Excel spreadsheet. The
Excel document was uploaded into QDA Miner and Wordstat software for data processing.
Wordstat is an application within QDA Miner that better enhances the capabilities of QDA
Miner which is a qualitative data analysis package that researchers use for coding, annotating, or
Data analysis
Data collected from the participants’ surveys were analyzed using QDA Miner and
Wordstat. First, a list of starter codes was created based on the literature review. Analysis begun
with the data being uploaded into QDA Miner and Wordstat and the codes were applied to each
participant’s response. The identification of the themes was determined through the use of QDA
Miner and Wordstat by a data display of information. Using QDA Miner and Wordstat, 22
themes were initially identified and are shown in Appendix I. An example of this process was
taking the code of psychological effects and applying it to all responses that specified a type of
68
psychological effect. For the first participant, he or she stated, “It has affected my family life as
I am depressed because of it and they have to see it as well”. This response, because it showed a
psychological effect, was coded as a psychological effect. Once all of the responses were coded
with the corresponding code, themes emerged. Any code that emerged in over 30% of the
participants was used as a major theme. Because depression emerged in 48% of the participants,
Based on the data, and by abstracting the 22 original themes, a reduction was able to be
made to include 6 major themes. The 6 major themes are identified in Table 1 below.
69
Table 1.
Participant\Themes Colleague Upset/Depressed Loss of Productivity/ Difficulty Social Media Email Manager
Working
1 X X X X
2 X X X
3 X X
4 X X X X X
5 X X X
6 X X
7 X
8 X X
9 X
10 X X X
11 X X X
12 X
13 X X X X
14 X X X
15 X X X
16 X X X X
17 X X
18 X X X X X
19 X X X
20 X X X
21 X X X X
Total 16 11 10 9 9 8
Results
This study was designed in order to understand the perceived effects of cyberbullying
from not only the victim’s perspective but a witness’s as well. Understanding the perceived
effects both psychical and psychological can help employers implement better policies and
procedures to prevent further damage to their employees. Initial coding areas of concern were:
impact on work life, impact on home life, who the cyberbullying was done by, and how the
Psychologic
Physical
al Effects of By who the How the
Effects of Impact on Impact on
Workplace Cyberbullyin Cyberbullyin
Workplace Work Life Home Life
Cyberbullyin g was done g was done
Cyberbullying
g
Upset/Depressed
Stomach Issues Loss of friends
Absenteeism Email
Worried
Stressed Colleague
Anxious
Overwhelmed
Angry
Leaving Text
Afraid
Lack of Concentration
Manager
Loss of productivity
Social Media
Difficulty working
Inability to get things
Headaches
done
Irrability
This qualitative study explored the current cyberbullying experiences of the workplace
from the victims’ and the witnesses’ viewpoint. Their personal experiences were studied in
order to get a better understanding of the physical, psychological, and emotional effects of
cyberbullying in the workplace. Albert Bandura’s Moral Disengagement Theory and Icek
Ajzen’s Theory of Planned Behavior provided a theoretical lens through which to make sense of.
Both of these theories provide insight into cyberbullying. The effortlessness of acting on a
certain behavior, in this case cyberbullying, makes it easier for the cyberbully to commit these
acts because of the lower risk of getting caught with the anonymity offered by the internet is an
72
example of the perceived behavioral control, an element of Theory of Planned Behavior (Pabian
& Vandebosch, 2014). Theory of Planned Behavior proposes that a person’s behavior is
reflected by three variables including subjective norms, attitude, and Perceived Behavioral
Subjective norm relates to how a persons’ perception of the surrounding environment relates to
their behavior and attitude is the degree to which a person displays either positive or negative
of Planned Behavior, 2017). Moral Disengagement Theory explains how the offender may
justify his act in order to feel that he or she is not doing anything wrong. Both theories play a
For the purpose of data processing into specific themes, the following definitions were
obtained and are listed in table 2 below. These definitions are all symptoms or issues associated
with cyberbullying.
73
Table 2
Loss of Friends When ones’ mood or actions causes them to loss the friends
that they previously had.
Inability to Get Things Done The inability to complete daily task as previously done.
Difficulty Working/Loss of Productivity When ones’ mental state starts effecting how they complete
task at work.
In order to find how employees describe the perceived effects of cyberbullying in the
ended questionnaire link was posted on Facebook pages. The surveys took participants between
six and twenty minutes to complete. The surveys were uploaded from Survey Monkey to excel
and then from Excel to QDA Miner and Wordstat. All results are presented by theme.
Table 3
1 X X X X
2 X X X
3 X X
4 X X X X X
5 X X X
6 X X
7 X
8 X X
9 X
10 X X X
11 X X X
12 X
13 X X X X
14 X X X
15 X X X
16 X X X X
17 X X
18 X X X X X
19 X X X
20 X X X
21 X X X X
Total 16 11 10 9 9 8
Theme # 1: Colleagues. Colleagues was one of the major themes mentioned by 76% of
the participants. When the participants were asked who, at work, did the cyberbullying come
from (Question #3), the theme of colleagues was developed. For example, P2 said, “The
cyberbullying was coming from a colleague.” And P4 said, “Multiple colleagues and two
administrators”.
Theme # 2: Upset/Depressed. Being upset or depressed was another major theme that
was identified by 10 out of the 21 participants. When the participants were asked to describe an
instance of cyberbullying and how they felt afterward (Question #10) as well as how does the
cyberbullying affect you at work or home (Questions #7 & #8), the theme of upset/depressed was
developed. For example, P1 said, “It has affected my family life as I am depressed because of it
and they have to see it as well. I received an email that pretty much told me I do not know how
to do my job. It left me in tears”. Another participant, P8, said I cry daily. I know after having a
baby you are hormonal, but I wish people would believe me when I say it is not hormones. I
went on to my fb and noticed I am not a part of any of the groups we had for such things like
difficulty working was another major theme that was identified by 10 out of the 21 participants.
When the participants were asked how does the cyberbullying affect them at work or how does
the cyberbullying affect them at home (Questions #7 & #8), the theme of loss of productivity
productivity at the workplace and the way I interact with my other colleagues, especially the one
that was targeting and cyberbullying me. It effects the, similar to what I said previously,
productivity of my home-life. Living in fear of getting harassed more effects the amount of
77
things I can get done at home”. And P15 said, “I do not want to be there. My productivity has
gone down because it is all I think about. I wanted to make a good impression after the
Theme # 4: Social Media. Social media was another major theme that was identified by
9 out of the 21 participants which accounts for over 40% of the participant population. When the
participants were asked in what ways they were cyberbullied (Question #5), the theme of social
media was developed. P13 said, “I was accidentally sent an email that was about me. It was
devastating. After I confronted her, I started getting post on my fb that were rude”. P15 also had
an issue with social media and said, “My coworkers posted on social media saying that I wasn’t
qualified for the promotion that I received. They bashed me and even though I wasn’t named, I
Theme # 5: Email. Email was another major theme that was identified by 9 out of the
21 participants which accounts for over 40% of the participant population. When the
participants were asked in what ways they were cyberbullied (Question #5), the theme of email
was developed. P3 stated, “My manager would send emails out to everyone that should have
gone to just me. For instance telling me I did something wrong”. P10 stated, “I was made to
feel belittled from ever email that he sent me. Just overall made me feel stupid”.
Theme #6: Manager. Manager was another major theme that was identified by 8 out of
the 21 participants which accounts for over 35% of the participant population. When the
participants were asked who, at work, did the cyberbullying come from (Question #3), the theme
of manager was developed. P3 said that it was a manager while P5 said that it was coming from
upper management.
78
Evaluation of Findings
In this qualitative study, the researcher examined workplace cyberbullying from the
victim and the witness’s viewpoint. After completing eligibility questions, 21 participants
qualified to participate in this research study. Qualified participants were directed to an online
the 21 participants who experienced or witnessed workplace cyberbullying, 76% were targeted
experienced or witnessed workplace cyberbullying, 48% were upset or depressed, and 48% had a
loss of productivity or had a difficult time at work or working. 43% experienced the workplace
Wordstat software was used to run a word frequency which is presented in figure 3.
Based on the results of the word frequency with such frequently used phrases as I have, I was,
and I am, demonstrates that the participants were consistent in describing how workplace
Using existing research as well as the theoretical framework, the results are consistent
with existing research the theories mentioned. The specific problem is that the impact of
cyberbullying has on adults in workplace are not known. The research theoretical framework
utilized Albert Bandura’s Moral Disengagement Theory and Icek Ajzen’s Theory of Planned
restructuring of inhumane actions into a benign moral justification and safeguards should be built
into social systems that would uphold moral and compassionate behavior and reduce cruelty.
Using Moral Disengagement Theory in cyberbullying research can help identify whether the
settings may afford selective activation in areas of moral disengagement and be a valuable asset
for cyber-safety programs that the employers can implement (Runions & Bak, 2015). It will also
80
be useful for understanding how online workplace setting may differentially afford moral
variables including subjective norms, attitude, and Perceived Behavioral Control (Cyberbullying
(1991), applying the Theory of Planned Behavior to a particular area, in this case cyberbullying,
can provide useful information in any attempt to actually understand the person’s behaviors or to
implement interventions that can be effective in changing those behaviors. The Theory of
Planned Behavior aligns with the intent of this study because it provides a connection between
behavior and beliefs. The foundation of beliefs can provide descriptions that are needed to gain
information about a person’s behavioral determinants and it is thought that it is the level of
beliefs that we can learn the unique factors that cause a person to engage in cyberbullying and
Both Theory of Planned Behavior and Moral Disengagement Theory are interrelated in
Behavioral Control, the effortlessness of acting on a certain behavior, in this case cyberbullying,
makes it easier for the cyberbully to commit these acts because of the lower risk of getting
caught with the anonymity offered by the internet (Pabian & Vandebosch, 2014). And with
Moral Disengagement Theory, the offender can justify his act in order to feel that he or she is not
doing anything wrong. Both theories play a role in understanding why co-workers may bully. If
someone understands why it is happening, safeguards can be put in place to help the victims so
81
that they may continue to work in peace. Chapter 5 will expand upon how the research question
Summary
This chapter presents the findings of a qualitative study that explored the perceived
effects of cyberbullying from the victims’ and the witnesses’ perspective. Eighteen victim
participants and three witness participants ranging in age from 21-65 shared their experiences
collection methodology was presented. The recruitment process was conducted via Facebook
pages geared towards workplace bullying. The survey ranged from approximately 6 minutes to a
maximum of 20 minutes and was guided by the questions (1) What is your definition of
cyberbullying? (2) When did you first become aware that you were a victim of cyberbullying at
work? How often? (3) Who, at work, did the cyberbullying come from? For example, was it
management, a colleague, or a customer/client? (4) How close were you to the cyberbully? For
example, were you previously friends or just met in the workplace? (5) In what ways were you
cyberbullied? (6) Why do you think you were a target? (7) How does the cyberbullying affect
you at work? (8) How does the cyberbullying affect you at home? (9) How do you cope with the
cyberbullying? (10) Describe an instance of cyberbullying and how you felt afterward. (11) Do
these incidents make you view co-workers differently and if so, how? (12) Did you take any
steps to end the cyberbullying and if so, what were they? (13) If the cyberbullying did end, what
actions were taken and by whom? for victims and (1) What is your definition of cyberbullying?
(2) When did you first become aware that your coworker was being cyberbullied? (3) Who, at
work, did the cyberbullying come from? For example, was it management, a colleague, or a
customer/client? (4) In what ways have you seen your co-worker cyberbullied? (5) Why do you
82
think the cyberbully choose your co-worker as a target? (6) Does it affect you in any way in the
workplace to see your co-worker cyberbullied and if so, how? (7) Were there any effects on your
home life to have to witness these acts of cyberbullying? (8) How close are you to the victim?
For example, are they just a colleague or are you friends outside of work? (9) Do these incidents
make you view your co-worker (the victim) any different and if so, how? (10) Do these incidents
make you view your co-worker (the perpetrator) any different and if so, how? (11) Describe an
incident of cyberbullying that you witnessed and how you felt after. (12) Did you take any steps
to stop the cyberbully and if so, what were they? If not, why? (13) If the cyberbullying did end,
what actions were taken and by whom? for witnesses. The data was entered into excel and then
uploaded into QDA Miner and Wordstat analysis software. Six major themes were identified as
having an impact on the participants. The six major themes that related to participants
experience were (1) colleagues (2) upset/depressed (3) loss of productivity or difficulty working
The 21 themes displayed in tables and figures are grounded on significance and strength
and are summarized in this chapter. The findings of this qualitative study addressed the research
question and are significant in finding the perceived effects of workplace cyberbullying. The
implication, recommendations, and conclusions related to the findings are presented in Chapter
5.
83
The purpose of this qualitative study was to explore the impact that cyberbullying has on
adults in the workplaces. The study was guided by the following research questions:
workplace?
coworkers?
This chapter will discuss the implications, recommendations for practice and recommendations
As technology advances, common forms of bullying are also advancing. Bullying has
added a new, anonymous form known as cyberbullying; and ease of use makes it that much more
popular as a means of harassment. Cyberbullying comes in many forms and can include
(Smith, 2015). Once only thought to be a problem amongst adolescents and young adults,
cyberbullying has moved into the workplace, affecting not only the employees but the employers
as well. The problem addressed by this study is that adults in the workplace are being affected
by cyberbullying. The specific problem is that the impact of cyberbullying has on adults in
workplaces.
schools but lacking in the workplace resulting in a lack of legal actions against those who
commit cyberbullying in the workplace (Kowalski et al., 2018). Knowing the perceived effects
that cyberbullying can have on the employees as well as the business can help employers identify
cyberbullying and implement procedures to counteract these issues. The negative consequences,
84
if this problem is not solved, are increased issues with employees and the workplace as well as
online. The phenomena of interest was cyberbullying and its perceived effects. A descriptive
design, with the intent of describing and understanding a phenomenon little explored, workplace
cyberbullying, was used. Materials included open-ended questionnaires and analysis was
conducted by using an open coding method where themes were identified. The responses were
analyzed and grouped to determine the different themes using such factors as word repetition and
key words. The sample size that was needed was 20-25 workers, between the ages of 21-65.
The research was conducted by collecting data via the internet for workers located in the
United States. Participants were recruited from cyberbullying Facebook pages. The participants
had to be current victims or witnesses at the job in which they identified as being cyberbullied.
This study examined what the perceived effects of cyberbullying on employees are. Since current
studies have found that cyberbullying is very prominent in adolescents and young adults, it is
expected that as these youths grow, the incidence for cyberbullying in later adulthood may be
more common, making the research that much more critical (Jenaro, Flores, & Frías, 2018).
cyberbullying from the victim’s and the witness’s viewpoint. After completing the screening
research study. Qualified participants were directed to an online open ended semi-structured
questionnaire that took approximately 20 minutes to complete. Of the 18 victim participants and
colleague whereas 38% were bullied by a manager. Of the victims of bullying, 48% were upset
85
or depressed, 48% had a loss of productivity or had a difficult time at work or working. Forty-
three percent experienced the workplace cyberbullying on social media and another 43% were
bullied through email. These findings suggest that, managers should be trained in identifying
cyberbullying, which not only affects the worker, loss of productivity can hurt the company as
well. Email should also be monitored at a corporate level as over 40% of cyberbullying cases are
from email.
This chapter addresses the implications of workplace cyberbullying on the victims, and
the themes that emerged are examined to better address psychological care of the victims and of
the witnesses of workplace cyberbullying better. Recommendations for practice and for future
Key findings show that of the 21 participants who experienced or witnessed workplace
cyberbullying, 76% were targeted by a colleague whereas 38% were targeted by a manager. Of
the 21 participants who experienced or witnessed workplace cyberbullying, 48% were upset or
depressed, and 48% had a loss of productivity or had a difficult time at work or working. 43%
experienced the workplace cyberbullying on social media and another 43% experienced it
through email.
Prior research has also shown that the effects on psychological well-being include
depression, lower self-esteem, and even lower academic satisfaction (Ren & Kim, 2017). It has
also been found in other research studies that that acts of bullying can deter productivity and
work performance which can be costly to an organization (Coetzee & van Dyk, 2018).
Implications
Knowing the effects that cyberbullying can have on the employees can help employers
implement procedures to counteract these issues. This research identifies the victim’s and
86
from.
The Theory of Planned Behavior and Moral Disengagement Theory provide a theoretical
framework to help understand why co-workers may bully. In elements of Theory of Planned
Behavior, such as perceived behavioral control, the effortlessness of acting on a certain behavior,
in this case cyberbullying, makes it easier for the cyberbully to act because of the lower risk of
getting caught due to the anonymity offered by the internet (Pabian & Vandebosch, 2014).
Moral Disengagement Theory suggests that the offender can justify his act in order to feel that he
Perceived effects of cyberbullying in the workplace. The research was guided by two
questions: How do employees describe the perceived effects of cyberbullying in the workplace?
and How do employees describe the perceived effects of cyberbullying on coworkers? Three of
the thirteen survey questions (Q7, Q8, & Q10) were directly related to addressing the first
question and three of the thirteen survey questions (Q6, Q7, & Q11) were directly related to
addressing the second. These are listed in Table 4 and Table 5 below.
87
Table 4
Table 5
Q6. Does it affect you in any way in the workplace to see your co-worker cyberbullied and if so, how?
Q7. Were there any effects on your home life to have to witness these acts of cyberbullying?
Q11. Describe an incident of cyberbullying that you witnessed and how you felt after?
The survey questions in Tables 4 & 5 were created to find the perceived effects of
workplace cyberbullying on adults. The results showed that of the 21 participants, almost half
(48%) suffered depression or were upset from the situations they were experiencing and almost
half (48%) had a difficult time working or loss of productivity. During the comprehensive
analysis of the data that was generated from the research findings, the participants identified
several factors that had an effect on how the workplace cyberbullying was affecting their work
and home life. Themes identified from the survey questions 7, 8 and 10 from the victim survey
and questions 6, 7, and 11 from the witness survey were loss of productivity/difficulty working
and upset/depression. The answer to research question one and question one (a) was supported
through the narratives that provided the following two themes in Table 6.
88
Table 6
Upset/depressed 21 10 48%
Upset/Depressed. Ten participants (48%) of the study described how being upset and/or
depression have affected them both at home and at work. P1 stated, “It has affected my family
life as I am depressed because of it and they have to see it as well. P4 stated, “Overall, any
experience has left me feeling numb and empty inside. It has made me feel defeated”. P8 stated,
“I cry daily.” These statements provided by the participants agree with previous research that
indicated that workplace cyberbullying was upsetting to the victim which could cause depression
Loss of productivity or difficulty working. The ten participants (48%) of the study
described how they have a loss of productivity or have difficulty working. P2 stated,
“Cyberbullying effects my productivity at the workplace and the way I interact with my other
colleagues, especially the one that was targeting and cyberbullying me. It effects the, similar to
what I said previously, productivity of my home-life. Living in fear of getting harassed more
effects the amount of things I can get done at home”. P4 stated, “It made my job incredibly
difficult. I was constantly afraid to go into work. Constantly afraid of what would be around
each corner. The snickers, the looks, the mean notes in my work mailbox, etc. all became far too
much to handle and would make me then use my sick days and personal days often because it
was easier than swallowing my pride to get a pay check”. P5 stated, “It really demotivated me. I
89
am no longer excited to come to work and I have severe anxiety when I know I will be in
meetings with this person”. These statements provided by the participants are supported by
literature review that shows bullying does have an effect on productivity of employees in the
workplace (Coetzee & van Dyk, 2018). Implications of this could include increased
absenteeism, more illnesses, poor productivity, lower quality of products produces by the
employee.
Recommendations based on the study methodology are presenting in this section based
on Albert Bandura’s Moral Disengagement Theory and Icek Ajzen’s Theory of Planned
Behavior, to provide help for victims of workplace cyberbullying. The findings in this study
support previous research and reiterate the need for organizations to implement and follow
policies and procedures to prevent workplace cyberbullying. Without any policies and procedure
put into place, the victims and the witnesses of workplace cyberbullying would need therapy or
counseling services from those professionals who understand, in depth, the effect of workplace
cyberbullying and are trained in these types of cases. The two recommendations listed below are
based on this study’s findings and the potential to enhance any therapeutic services that the
victim may seek and are based on moral disengagement theory and the theory of planned
behavior.
departments, become familiar with the theories and the perceived effects of workplace
cyberbullying in order to create a safe work environment both in person and electronically,
familiar with the perceived effects of workplace cyberbullying in order to provide care to those
who cannot seek help from their organizations for fear of retaliation or losing their job.
Based on the findings of this sample where all participants had to be currently
research also include those who were previously cyberbullied in the workplace to see if the
effects are still occurring even after the cyberbullying has ended and to gain more participant
responses. Many of the participants were disqualified because they are no longer experiencing
cyberbullying but knowing if they are still experiencing effects would be helpful to create
awareness of the prevalence of workplace cyberbullying and how it can be detrimental to not
Another research options that could further the understanding of how jobs respond to this
type of issue is conducting a study including human resource employees and what type of plans
they have in place when faced with employees that are experiencing cyberbullying in the
workplace. Lastly, it would be beneficial to ask demographic information such as gender and/or
age to know if it is women or men who are experiencing this more and what is the general age
range for people that are victims of cyberbullying. Knowing this information could help human
resource departments create a better plan of action for aiding employees that are experiencing
Conclusion
The purpose of this study was to find and describe the perceived effects of workplace
cyberbullying from both the victim’s and the witness’s perspective based on (2) 13 question
91
surveys. The qualitative methodology and the semi-structured questionnaires allowed for an in-
depth analysis of how victims and witnesses of workplace cyberbullying say how it affects them.
QDA Miner and Wordstat software programs were used to identify themes that came from the
surveys data collected from the 18 participants that were victims and the 3 participants that were
witnesses. Wordstat is an application within QDA Miner that better enhances the capabilities of
QDA Miner which is a qualitative data analysis package that researchers use for coding,
annotating, or analyzing any size collection of data. Survey data was collected using Survey
Monkey links posted on Facebook pages that were geared toward workplace bullying. Data
presented here supports previous research that found that workplace bullying has negative effects
The specific problem is that the impact of cyberbullying has on adults in workplaces are
not known. The semi-structure open-ended questionnaires allowed participants a chance to tell
their experience in their words. This study identified who the main culprits of cyberbullying
were and what common modes were used to commit cyberbullying and discussed the
psychological effects of workplace cyberbullying and how it affects victims’ home and work
lives. This research is able to add to the understanding of workplace cyberbullying from both the
victim’s and the witness’s view point. Further research using participants that were previously
cyberbullied as well as current victims and witnesses is recommended. Employers should also
implement training as to what constitutes as cyberbullying and what actions should be taken if it
is found to be happening.
Technology, social media, and the Internet are all useful tools for a business to grow and
promote but when employees take advantage of these tools, not only do the businesses suffer but
the employees at which the cyberbullying is aimed do too. Research in this area is so important
92
because this issue will only increase as technology grows and becomes more advanced.
Research may also provide information that may be used to develop policies and procedures that
would aide in handling cyberbullying that currently is taking place in the workplace. Policies
and procedures must be put in place so that employees can continue to be productive in their job
and the companies can continue to thrive without having to worry about high turnover rates.
93
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision
Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-t
Al-Busaidi, Z. Q. (2008). Qualitative research and its uses in health care. Sultan Qaboos
University Medical Journal, 8(1), 11-19. Retrieved August 5, 2018, from
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3087733/.
Al-garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Full length article: Cybercrime
detection in online communications: The experimental case of cyberbullying detection in
the Twitter network. Computers in Human Behavior, 63433-443.
doi:10.1016/j.chb.2016.05.051
Asher, Y., Stark, A., & Fireman, G. D. (2017). Full length article: Comparing electronic and
traditional bullying in embarrassment and exclusion scenarios. Computers in Human
Behavior, 7626-34. doi:10.1016/j.chb.2017.06.037
Ashiq, S., Majeed, S., & Malik, F. (2016). Psychological predictors of cyber bullying in early
adulthood. Health Science Journal, 10(3), 1-9.
Bandura, A. (2002). Selective moral disengagement in the exercise of moral agency. Journal of
Moral Education, 31(2), 101-119. doi:10.1080/0305724022014322
Barlett, C. P., & Kowalewski, D. A. (2018). Learning to cyberbully: An extension of the Barlett
Gentile cyberbullying model. Psychology of Popular Media Culture,
doi:10.1037/ppm0000183
Bauman, S. (2011). Cyberbullying: What counselors need to know. Alexandria, VA: American
Counseling Association.
Bauman, S., Cross, D., & Walker, J. (2015). Principles of cyberbullying research: definitions,
measures, and methodology. London; New York: Routledge.
Bauman, S., & Newman, M. L. (2013). Testing assumptions about cyberbullying: Perceived
distress associated with acts of conventional and cyber bullying. Psychology of Violence,
3(1), 27-38. doi:10.1037/a0029867
Branley, D. B., & Covey, J. (2018). Full length article: Risky behavior via social media: The role
of reasoned and social reactive pathways. Computers in Human Behavior, 78183-191.
94
doi:10.1016/j.chb.2017.09.036
Bussey, K., Fitzpatrick, S., & Raman, A. (2015). The role of moral disengagement and self-
efficacy in cyberbullying. Journal of School Violence, 14(1), 30.
doi:10.1080/15388220.2014.954045
Case, B. (2015). What every physical educator and athletic coach should know about bullying,
cyber bullying, and hazing. Virginia Journal, 36(1), 19-21.
Cheung, M. F., & To, W. (2016). Service co-creation in social media: An extension of the theory
of planned behavior. Computers in Human Behavior, 65260-266.
doi:10.1016/j.chb.2016.08.031
Choo, H. Y. (2015). Why we are still searching for solutions to cyberbullying: An analysis of the
North American responses to cyberbullying under the theory of systemic
desensitization. University of New Brunswick Law Journal, 6652-77.
Coburn, P. I., Connolly, D. A., & Roesch, R. (2015). Cyberbullying: Is federal criminal
legislation the solution?. Canadian Journal of Criminology & Criminal Justice, 57(4),
566-579. doi:10.3138/cjccj.2014.E43
Coetzee, M., & van Dyk, J. (2018). Workplace bullying and turnover intention: exploring work
engagement as a potential mediator. Psychological Reports, 121(2), 375.
doi:10.1177/0033294117725073
Colorado State University. (2018) Advantages of open-ended questions. Retrieved May 23,
2018, from https://writing.colostate.edu/guides/popup.cfm?pageid=1414&guideid=68
Colorafi, K. J., & Evans, B. (2016). Qualitative descriptive methods in health science
research. Herd-Health Environments Research & Design Journal, 9(4), 16-25.
Creasy, T., & Carnes, A. (2017). The effects of workplace bullying on team learning, innovation
and project success as mediated through virtual and traditional team
dynamics. International Journal of Project Management, 35964-977.
doi:10.1016/j.ijproman.2017.04.005
Creswell, J. W. (2006). Qualitative inquiry and research design: Choosing among five
approaches Second Edition. SAGE Publications (CA).
Creswell, J. W., Hanson, W. E., Plano Clark, V. L., & Morales, A. (2007). Qualitative research
95
D'Cruz, P., & Noronha, E. (2014). The interface between technology and customer
cyberbullying: Evidence from India. Information and Organization, 24176-193.
doi:10.1016/j.infoandorg.2014.06.001
DeMatteo, D., Wagage, S., & Fairfax-Columbo, J. (2017). Cyberstalking: Are we on the same
(web)page? A comparison of statutes, case law, and public perception. Journal of
Aggression, Conflict and Peace Research, 9(2), 83-94. doi:10.1108/JACPR-06-2016-
0234
Doane, A.N., Boothe, L.G., Pearson, M.R., & Kelley, M.L. (2016). Full length article: Risky
Electronic communication behaviors and cyberbullying victimization: An application of
Protection Motivation Theory. Computers in Human Behavior, 60508-513.
doi: 10.1016/j.chb.2016.02.010
Dooley, J. J., Pyżalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A
theoretical and conceptual review. Zeitschrift Für Psychologie/Journal of
Psychology, 217(4), 182-188. doi:10.1027/0044-3409.217.4.182
El Asam, A., & Samara, M. (2016). Review: Cyberbullying and the law: A review of
psychological and legal challenges. Computers in Human Behavior, 65127-141.
doi:10.1016/j.chb.2016.08.012
Elo, S., Kääriäinen, M., Kanste, O., Pölkki, T., Utriainen, K., & Kyngäs, H. (2014). Qualitative
Content Analysis: A Focus on Trustworthiness. SAGE
Open. https://doi.org/10.1177/2158244014522633
Erik, B. (2016). A reflexive exploration of two qualitative data coding techniques. Journal of
Methods and Measurement in The Social Sciences, 20(1), 14-29.
doi:10.2458/jmm.v6i1.18772
96
Fabber, V. L. (2018). Workplace bullying: Understanding the victims perspective (Order No.
10810551). Available from ProQuest Dissertations & Theses Global. (2048347772).
Retrieved from
http://search.proquest.com.proxy1.ncu.edu/docview/2048347772?accountid=28180
Fisher, B., Gardella, J., & Teurbe-Tolon, A. (2016). Peer cybervictimization among adolescents
and the associated internalizing and externalizing problems: A meta-analysis. Journal of
Youth & Adolescence, 45(9), 1727-1743. doi:10.1007/s10964-016-0541-z
Fox, S., & Cowan, R. L. (2015). Revision of the workplace bullying checklist: The importance of
human resource management's role in defining and addressing workplace
bullying. Human Resource Management Journal, 25(1), 116-130. doi:10.1111/1748-
8583.12049
Frison, E. E., Subrahmanyam, K., & Eggermont, S. (2016). The short-term longitudinal and
reciprocal relations between peer victimization on Facebook and adolescents' well-being.
Journal of Youth & Adolescence, 45(9), 1755-1771.
Fusch, P. I., & Ness, L. R. (2015). Are we there yet? Data saturation in qualitative research.
Qualitative Report, 20(9), 1408.
Gao, M., Zhao, X., & McJunkin, M. (2016). Adolescents' experiences of cyberbullying: Gender,
age and reasons for not reporting to adults. International Journal of Cyber Behavior,
Psychology and Learning (IJCBPL), 6(4), 13.
Garaigordobil, M., & Machimbarrena, J. M. (2017). Stress, competence, and parental educational
styles in victims and aggressors of bullying and cyberbullying. Psicothema, 29(3), 335-
340. doi:10.7334/psicothema2016.258
Given, L. M. (2008). The SAGE encyclopedia of qualitative research methods (Vols. 1-0).
Thousand Oaks, CA: SAGE Publications Ltd doi: 10.4135/9781412963909
Hagger, M. S., & Chatzisarantis, N. L. (2009). Assumptions in research in sport and exercise
psychology. Psychology of Sport & Exercise, 10(Research Quality in Sport & Exercise
Psychology), 511-519. doi:10.1016/j.psychsport.2009.01.004
Hall, R., & Lewis, S. (2014). Managing workplace bullying and social media policy:
Implications for employee engagement. Academy of Business Research Journal, 1128-
138.
Halpern, D., Pina, M., & Vasquez, J. (2017). Loneliness, personal and social well-being:
Towards a conceptualization of the effects of cyberbullying. Cultura Y Educacion, 29(4),
97
703-727.
Hamm, M. P., Newton, A. S., Chisholm, A., Shulhan, J., Milne, A., Sundar, P., & Hartling, L.
(2015). Prevalence and effect of cyberbullying on children and young people: A scoping
review of social media studies. JAMA Pediatrics, 169(8), 770-777.
doi: 10 .1001/jamapediatrics.2015.0944
Hellemans, C., Dal Cason, D., & Casini, A. (2017). Bystander helping behavior in response to
workplace bullying. Swiss Journal of Psychology, 76(4), 135-144. doi:10.1024/1421-
0185/a000200
Hendricks, L., Lumadue, R., & Waller, L. (2012). The evolution of bullying to cyber bullying: an
overview of the best methods for implementing a cyber bullying prevention program.
National Forum Journal of Counseling and Addiction, 1(1). Retrieved June 18, 2018,
from http://www.nationalforum.com/Electronic Journal Volumes/Hendricks, LaVelle
Cyber Bullying NFJCA V1 N1 2012.pdf
Hymel, S., & Swearer, S. M. (2015). Four decades of research on school bullying: An
introduction. American Psychologist, 70(4), 293-299. doi:10.1037/a0038928
Jafarkarimi, H., Saadatdoost, R., Sim, A. H., & Hee, J. M. (2016). Full length article: Behavioral
intention in social networking sites ethical dilemmas: An extended model based on
Theory of Planned Behavior. Computers in Human Behavior, 62545-561.
doi:10.1016/j.chb.2016.04.024
Jenaro, C., Flores, N., & Frías, C. P. (2018). Systematic review of empirical studies on
cyberbullying in adults: What we know and what we should investigate. Aggression &
Violent Behavior, 38113-122. doi:10.1016/j.avb.2017.12.003
Kelley, K., Clark, B., Brown, V., & Sitzia, J. (2003). Good practice in the conduct and reporting
of survey research. International Journal for Quality in Health Care | Oxford Academic.
Retrieved May 27, 2018, from https://academic.oup.com/intqhc/article/15/3/261/1856193
Keskin, H., Akgün, A. E., Ayar, H., & Kayman, Ş. S. (2016). Cyberbullying victimization,
counterproductive work behaviours and emotional intelligence at workplace. Procedia –
Social and Behavioral Sciences, 235(12th International Strategic Management
Conference, ISMC 2016, 28-30 October 2016, Antalya, Turkey), 281-287.
doi:10.1016/j.sbspro.2016.11.031
Kowalski, R. M., Toth, A., & Morgan, M. (2018). Bullying and cyberbullying in adulthood and
the workplace. Journal of Social Psychology, 158(1), 64-81.
doi:10.1080/00224545.2017.1302402
Lazuras, L., Barkoukis, V., & Tsorbatzoudis, H. (2017). Face-to-face bullying and cyberbullying
in adolescents: Trans-contextual effects and role overlap. Technology in Society, 4897-
101. doi:10.1016/j.techsoc.2016.12.001
Lee, J., Hong, J. S., Resko, S. M., & Tripodi, S. J. (2017). Face-to-face bullying, cyberbullying,
and multiple forms of substance use among school-age adolescents in the USA. School
Mental Health, 10(1), 12-25.
Lowry, P. B., Moody, G. D., & Chatterjee, S. (2017). Using IT design to prevent
cyberbullying. Journal of Management Information Systems, 34(3), 863-901.
doi:10.1080/07421222.2017.1373012
Manners, I., & Cates, S. (2016). Bullying in the workplace: Does it exist in United States
organizations. International Journal of Business & Public Administration, 13(2), 99-114.
Meriläinen, M., Sinkkonen, H., Puhakka, H., & Käyhkö, K. (2016). Bullying and inappropriate
behaviour among faculty personnel. Policy Futures in Education, 14(6), 617-634.
Messias, E., Kindrick, K., & Castro, J. (2014). School bullying, cyberbullying, or both: correlates
of teen suicidality in the 2011 CDC Youth Risk Behavior Survey. Comprehensive
Psychiatry, 55(5), 1063-1068. doi:10.1016/j.comppsych.2014.02.005
Minnesota State University. (2018). Theory of planned behavior. Retrieved April 13, 2018, from
http://www.mnsu.edu/its/academic/isalt_tpb.pdf
Nesi, J., Miller, A. B., & Prinstein, M. J. (2017). Adolescents' depressive symptoms and
subsequent technology-based interpersonal behaviors: A multi-wave study. Journal of
Applied Developmental Psychology, 51(Applying Symptoms-Driven Models of
Depression to the Investigation of Peer Relationship Adversity: Mediating and
Moderating Mechanisms), 12-19. doi:10.1016/j.appdev.2017.02.002
Oberst, U., Wegmann, E., Stodt, B., Brand, M., & Chamarro, A. (2017). Negative consequences
from heavy social networking in adolescents: The mediating role of fear of missing out.
Journal of Adolescence, 5551-60. doi:10.1016/j.adolescence.2016.12.008
O’Cathain, A., & Thomas, K. J. (2004). “Any other comments?” Open questions on
questionnaires – a bane or a bonus to research? BMC Medical Research Methodology, 4,
25. http://doi.org/10.1186/1471-2288-4-25
Pabian, S., & Vandebosch, H. (2014). Using the theory of planned behaviour to understand
cyberbullying: The importance of beliefs for developing interventions. European Journal
of Developmental Psychology, 11(4), 463-477. doi:10.1080/17405629.2013.858626
99
Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., & Hoagwood, K. (2015).
Purposeful sampling for qualitative data collection and analysis in mixed method
implementation research. Administration and Policy in Mental Health, 42(5), 533–544.
http://doi.org/10.1007/s10488-013-0528-y
Pastorek, S., Contacos-Sawyer, J., & Thomas, B. (2015). Creating a no-tolerance policy for
workplace bullying and harassment. Competition Forum, 13(2), 232-240.
Privitera, C., & Campbell, M. A. (2009). Cyberbullying: The new face of workplace
bullying? Cyberpsychology & Behavior: The Impact of the Internet, Multimedia And
Virtual Reality on Behavior and Society, 12(4), 395-400. doi:10.1089/cpb.2009.0025
Provalis Research. (2018). Software for coding open ended questions - QDA Miner & WordStat.
Retrieved May 23, 2018, from https://provalisresearch.com/solutions-
2/applications/open-ended-question-analysis/
Ptaszynski, M., Masui, F., Nitta, T., Hatakeyama, S., Kimura, Y., Rzepka, R., & Araki, K.
(2016). Sustainable cyberbullying detection with category-maximized relevance of
harmful phrases and double-filtered automatic optimization. International Journal of
Child-Computer Interaction, 815-30. doi:10.1016/j.ijcci.2016.07.002
Radovic, A., Gmelin, T., Stein, B. D., & Miller, E. (2017). Depressed adolescents' positive and
negative use of social media. Journal of Adolescence, 555-15.
doi:10.1016/j.adolescence.2016.12.002
Rahman, M. S. (2016). The advantages and disadvantages of using qualitative and quantitative
approaches and methods in language “Testing and Assessment” research: A literature
review. Journal of Education and Learning, 6(1), 102. doi:10.5539/jel.v6n1p102
Rai, A., & Agarwal, U. A. (2016). Workplace bullying: A review and future research directions.
South Asian Journal of Management, 23(3), 27-56.
Reed, K. P., Cooper, R. L., Nugent, W. R., & Russell, K. (2016). Cyberbullying: A literature
100
Reio, J. G., & Ledesma Ortega, C. C. (2016). Chapter 8: Cyberbullying and its emotional
consequences. What we know and what we can do. Emotions, Technology, And
Behaviors, 145-158. doi:10.1016/B978-0-12-801873-6.00008-X
Ren, L., & Kim, H. (2017). Effects of bullying experience on psychological well-being mediated
by conflict management styles and psychological empowerment among nursing students
in clinical placement: A structural equation modeling approach. Journal of Korean
Academy of Nursing, 47(5), 700-711.
Renati, R., Berrone, C., & Zanetti, M. A. (2012). Morally disengaged and unempathic: Do
cyberbullies fit these definitions? An Exploratory Study. Cyberpsychology, Behavior &
Social Networking, 15(8), 391-398. doi:10.1089/cyber.2012.0046
Resnick, D. B., J.D., Ph.D. (2015). What is ethics in research & why is it important? Retrieved
August 17, 2018, from
https://www.niehs.nih.gov/research/resources/bioethics/whatis/index.cfm
Runions, K. C., & Bak, M. (2015). Online moral disengagement, cyberbullying, and cyber-
aggression. Cyberpsychology, Behavior & Social Networking, 18(7), 400-405.
doi:10.1089/cyber.2014.0670
Ryan, M. m. (2016). Besting the workplace bully. Reference & User Services Quarterly, 55(4),
267-269.
Samara, M., Burbidge, V., El Asam, A., Foody, M., Smith, P. K., & Morsi, H. (2017). Bullying
and cyberbullying: Their legal status and use in psychological assessment. International
Journal of Environmental Research & Public Health, 14(12), 1.
doi:10.3390/ijerph14121449
Samnani, A., & Singh, P. (2016). Workplace bullying: Considering the interaction between
individual and work environment. Journal of Business Ethics, 139(3), 537-549.
doi:10.1007/s10551-015-2653-x
Selkie, E. M., Kota, R., Chan, Y., & Moreno, M. (2015). Cyberbullying, depression, and
problem alcohol use in female college students: A multisite study. Cyberpsychology,
Behavior, and Social Networking, 18(2), 79-86. doi:10.1089/cyber.2014.0371
Shimizu, A. (2013). Domestic violence in the digital age: towards the creation of a
101
comprehensive cyberstalking statute. Berkeley Journal of Gender, Law & Justice, 28(1),
116-137.
Shu-Ching, M., Hsiu-Hung, W., & Tsair-Wei, C. (2017). Hospital nurses' attitudes, negative
perceptions, and negative acts regarding workplace bullying. Annals of General
Psychiatry, 161-9. doi:10.1186/s12991-017-0156-0
Song, J., & Oh, I. (2018). Full length article: Factors influencing bystanders' behavioral reactions
in cyberbullying situations. Computers in Human Behavior, 78273-282.
doi:10.1016/j.chb.2017.10.008
Sijtsema, J. J., Rambaran, J. A., Caravita, S. S., & Gini, G. (2014). Friendship selection and
influence in bullying and defending: Effects of moral disengagement. Developmental
Psychology, 50(8), 2093-2104. doi:10.1037/a0037145
Smith, P. K. (2015). The nature of cyberbullying and what we can do about it. Journal of
Research in Special Educational Needs, 15(3), 176-184. doi:10.1111/1471-3802.12114
Snyman, R., & Loh, J. (2015). Full Length Article: Cyberbullying at work: The mediating role
of optimism between cyberbullying and job outcomes. Computers in Human
Behavior, 53161-168. doi:10.1016/j.chb.2015.06.050
Trad, M., & Johnson, J. (2014). Bullying among radiation therapists: Effects on job performance
and work environment. Radiologic Technology, 86(2), 122-131.
Turner, D. W. (2010). Qualitative interview design: A practical guide for novice investigators.
The Qualitative Report, 15(3), 754-760. Retrieved from
https://nsuworks.nova.edu/tqr/vol15/iss3/19
Uwe, F. (2018). The SAGE Handbook of Qualitative Data Collection. 55 City Road, London:
SAGE Publications, Ltd. doi:10.4135/9781526416070
Volk, A. A., Dane, A. V., & Marini, Z. A. (2014). What is bullying? A theoretical
redefinition. Developmental Review, 34327-343. doi:10.1016/j.dr.2014.09.001
Volk, A. A., Veenstra, R., & Espelage, D. L. (2017). So you want to study bullying?
Recommendations to enhance the validity, transparency, and compatibility of bullying
research. Aggression and Violent Behavior, 3634-43. doi:10.1016/j.avb.2017.07.003
Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & De Witte, H. (2017). Full length
article: The dark side of working online: Towards a definition and an Emotion Reaction
model of workplace cyberbullying. Computers in Human Behavior, 69324-334.
doi:10.1016/j.chb.2016.12.055
102
Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & De Witte, H. (2018). When workplace
bullying goes online: construction and validation of the Inventory of Cyberbullying Acts
at Work (ICA-W). European Journal of Work & Organizational Psychology, 27(1), 28.
doi:10.1080/1359432X.2017.1363185
Wang, X., Yang, L., Yang, J., Wang, P., & Lei, L. (2017). Full length article: Trait anger and
cyberbullying among young adults: A moderated mediation model of moral
disengagement and moral identity. Computers in Human Behavior, 73519-526.
doi:10.1016/j.chb.2017.03.073
Waasdorp, T. E., & Bradshaw, C. P. (2015). Original article: The overlap between cyberbullying
and traditional bullying. Journal of Adolescent Health, 56483-488.
doi:10.1016/j.jadohealth.2014.12.002
Willis, D. G., Sullivan-Bolyai, S., Knafl, K., & Cohen, M. Z. (2016). Distinguishing Features
and Similarities Between Descriptive Phenomenological and Qualitative Description
Research. Western Journal of Nursing Research, 38(9), 1185-1204.
Wilson, C. J., & Nagy, M. S. (2017). The effects of personality on workplace bullying. The
Psychologist-Manager Journal, 20(3), 123-147. doi:10.1037/mgr0000054
Wolke, D., & Lereya, S. T. (2015). Long-term effects of bullying. Archives of Disease in
Childhood, 100(9), 879. doi:http://dx.doi.org.proxy1.ncu.edu/10.1136/archdischild-2014-
306667
Wu, S., & Wu, C. (2018). Bullying bystander reactions: A case study in the Taiwanese
workplace. Asia Pacific Journal of Human Resources, doi:10.1111/1744-7941.12175
Yamada, D. C. (2015). Workplace bullying and the law: U.S. legislative developments 2013-
15. Employee Rights & Employment Policy Journal, 19(1), 49-59.
Yang, Y. T., & Grinshteyn, E. (2016). Safer cyberspace through legal intervention: A
comparative review of cyberbullying legislation. World Medical & Health Policy, 8(4),
458. doi:10.1002/wmh3.206
Yaya, J. A. (2014). Choosing the right measurement instrument for your project: Tips to
apply. Retrieved May 22, 2018, from https://nairaproject.com/blog/measurement-
instrument.html
Youn Ah, J. (2018). What makes bullying happen in school? Reviewing contextual
characteristics surrounding individual and intervention programs on bullying. Ilkogretim
Online, 17(1), 1-6.
103
Zhang, S., & Leidner, D. (2018). From improper to acceptable: How perpetrators neutralize
workplace bullying behaviors in the cyber world. Information & Management,
doi:10.1016/j.im.2018.03.012
Zych, I., Ortega-Ruiz, R., & Del Rey, R. (2015). Scientific research on bullying and
cyberbullying: Where have we been and where are we going. Aggression and Violent
Behavior, 24188-198.doi:10.1016/j.avb.2015.05.015
104
2. When did you first become aware that you were a victim of cyberbullying at work? How
often?
3. Who, at work, did the cyberbullying come from? For example, was it management, a
colleague, or a customer/client?
4. How close were you to the cyberbully? For example, were you previously friends or just
11. Do these incidents make you view co-workers differently and if so, how?
12. Did you take any steps to end the cyberbullying and if so, what were they?
13. If the cyberbullying did end, what actions were taken and by whom?
106
2. When did you first become aware that your coworker was being cyberbullied?
3. Who, at work, did the cyberbullying come from? For example, was it management, a
colleague, or a customer/client?
6. Does it affect you in any way in the workplace to see your co-worker cyberbullied and if
so, how?
7. Were there any effects on your home life to have to witness these acts of cyberbullying?
8. How close are you to the victim? For example, are they just a colleague or are you
9. Do these incidents make you view your co-worker (the victim) any different and if so,
how?
10. Do these incidents make you view your co-worker (the perpetrator) any different and if
so, how?
11. Describe an incident of cyberbullying that you witnessed and how you felt after.
12. Did you take any steps to stop the cyberbully and if so, what were they? If not, why?
13. If the cyberbullying did end, what actions were taken and by whom?
107
1. Weight gain
2. Headaches
3. Stomach issues
1. Upset/Depressed
2. Irritable
3. Worried/stressed/anxious/Overwhelmed
4. Angry
5. Afraid
6. Lack of concentration
1. Loss of friends
2. Financial difficulties
3. Fighting
1. Absenteeism
3. Leaving
108
1. Manager
2. Colleague
1. Social Media
2. Email
3. Text
109
My name is Melissa Dark and I am a student at NorthCentral University doing research about the
effects of cyberbullying on adults in the workplace. I am asking those who would like to
minutes to complete the survey for this research project. To qualify, you must be between the
ages of 21 and 65, be a current victim or witness to cyberbullying in the workplace, and work in
the United States. Participation is completely voluntary, and your answers will be anonymous.
If you are interested, please click on the link below for the survey that you most identify with.
https://www.surveymonkey.com/r/mdarkvcb
https://www.surveymonkey.com/r/mdarkwcb
Thank you,
Melissa Dark
110
Introduction:
voluntary. I am seeking your consent to involve you and your information in this study. A
reason you might not want to participate in the study is having to answer open ended
questions about being a victim or a witness of cyberbullying. A reason you might want to
that policies and procedures can be put into place. An alternative to this study is not
participating. I am here to address your questions or concerns during the informed consent
process.
PRIVATE INFORMATION
Certain private information may be collected about you in this study. I will make the
following effort to protect your private information by not requiring any personal
information. If you do provide your name, it will be stored under an alias. Even with this
effort, there is a chance that your private information may be accidentally released. The
chance is small but does exist. You should consider this when deciding whether to
participate.
Activities:
Eligibility:
111
Risks:
There are minimal risks in this study. Some possible risks include: anxiety or stress over
To decrease the impact of these risks, you can: skip any questions or stop participation at any
time.
Benefits:
The potential benefits to others are: organizations can better understand cyberbullying to be
Confidentiality:
The information you provide will be kept confidential to the extent allowable by law. Some
steps I will take to keep your identity confidential are: I will use a fake name to identify you.
The people who will have access to your information are: myself, my dissertation chair,
and/or my dissertation committee. The Institutional Review Board may also review my
I will secure your information with these steps: locking the computer file with a password.
I will keep your data for 7 years. Then, I will delete electronic data and destroy paper data.
Contact Information:
If you have questions for me, you can contact me at: m.dark8407@o365.ncu.edu.
My dissertation chair’s name is Nancy Lees. She works at Northcentral University and is
nlees@ncu.edu.
If you contact us, you will be giving us information like your phone number or email address.
This information will not be linked to your responses if the study is anonymous.
If you have questions about your rights in the research, or if a problem has occurred, or if you
are injured during your participation, please contact the Institutional Review Board at:
Voluntary Participation:
Your participation is voluntary. If you decide not to participate, or if you stop participation
after you start, there will be no penalty to you. You will not lose any benefit to which you
Future Research
Any information or specimens collected from you during this research may not be used for
Anonymous Study
This study is anonymous, and it is not the intention of the researcher to collect your name.
However, you do have the option to provide your name voluntarily. Please know that if you
do, it may be linked to your responses in this study. Any consequences are outside the
113
to provide your name, a space will be provided. Again, including your name is voluntary, and
you can continue in the study if you do not provide your name.
I have read the above information, or it has been read to me. I have had the opportunity to
ask questions about it and any questions that I have asked were answered to my
___Yes ___No
_________________________________
Participants Name
114
A trial study was conducted by providing two experts with both sets of 12 questions.
This is important to endure readability and that the participants will understand the questions as
well as give honest feedback on the questionnaire design (Mcleod, 2018). A trial study was also
The first reviewer mentioned that it was a timely issue and the participants sense of
confidentiality will be very important. It was also stressed that the demographics that are
obtained should not be perceived as identifiable. There was no changes to the structure of the
questions, however.
The second reviewer suggested either asking the participant what their definition of
cyberbullying is or having it defined for them before they start either survey. People may have
different views on what cyberbullying is so, this would help during the coding process. The
author will be adding a question #13 to see what each respondents’ view of cyberbullying is. It
was then suggested to change “when did you first notice”, to “when did you first become aware”.
That change will be made. It was lastly suggested to add customer to the list of people who may
be the cyberbully. Since an employee can very well be cyberbullied by a customer, it will be
added to the questionnaire. These changes were added to both the victim and the witness
questionnaires.
123
1 Colleague 16/21 76 X X X X X X
2 Upset/Depressed 10/21 48 X X X
Working
5 Email 9/21 43 X X X X X X
6 Manager 8/21 38 X X X X X X
7 Worried/Stressed/ 6/21 29 X X X X
Anxious/Overwhelmed
9 Text 4/21 19 X X
12 Absenteeism 3/21 14 X X
13 Angry 2/21 10
14 Afraid 2/21 10 X X
16 Leaving 2/21 10 X
18 Headaches 1/21 5
19 Irritable 1/21 5
22 Fighting 1/21 5
124
Themes Participants % P12 P13 P14 P15 P16 P17 P18 P19 P20 P21
1 Colleague 16/21 76 X X X X X X X X X X
2 Upset/Depressed 10/21 48 X X X X X X X
Working
5 Email 9/21 43 X X X
6 Manager 8/21 38 X X
7 Worried/Stressed/ 6/21 29 X X
Anxious/Overwhelmed
9 Text 4/21 19 X X
12 Absenteeism 3/21 14 X
13 Angry 2/21 10 X X
14 Afraid 2/21 10
16 Leaving 2/21 10 X
18 Headaches 1/21 5 X
19 Irritable 1/21 5 X
22 Fighting 1/21 5 X