Cyber-bullying research in Kenya: a meta-analysis

DOIhttps://doi.org/10.1108/GKMC-08-2020-0124
Published date18 May 2021
Date18 May 2021
Pages208-229
Subject MatterLibrary & information science,Information behaviour & retrieval,Information in society,Information literacy,Library & information services
AuthorTom Kwanya,Angella C. Kogos,Lucy Wachera Kibe,Erick Odhiambo Ogolla,Claudia Onsare
Cyber-bullying research in Kenya:
a meta-analysis
Tom Kwanya,Angella C. Kogos,Lucy Wachera Kibe and
Erick Odhiambo Ogolla
Information and Knowledge Management, Technical University of Kenya,
Nairobi, Kenya, and
Claudia Onsare
Language and Literary Studies, Technical University of Kenya, Nairobi, Kenya
Abstract
Purpose Cyber-bullying is a form of harassmentthat is perpetrated using electronic media. The practice
has becomeincreasingly common especially with thegrowing ubiquity of social media platforms.Most cyber-
bullying cases inevitablyoccur on Facebook because it is the most preferred social media platform. However,
little is known about cyber-bullying research in Kenya. This paper aims to analyse the quantity, quality,
visibilityand authorship trends of scholarly publications on cyber-bullyingfrom and/or about Kenya.
Design/methodology/approach This study was conductedas a systematic literature review. A meta-
analysis approach was used. Bibliometrics approaches were used to conduct the analysis. Data on the
publications was collected from Google Scholar using HarzingsPublish or Perishsoftware and then
analysedand presented using Microsoft Excel, Notepad and VOSviewer.
Findings The study yielded 359 research publications on cyber-bullying in Kenya. There was a gradual
increment in the number of publications, peaking in 2018. Nearly half of the publicationshave not been cited indicating
low uptake of research on cyber-bullying in Kenya. It also emerged that most of the research has been published on
subscription channels thereby restricting their visibility, access and use. Minimal collaboration in research on cyber-
bullying in Kenya was also observed since 67.4% of the publications were written by a single (one) author. The
authors conclude that the quantity, quality and visibility of research on cyber-bullying in Kenya is low.
Originality/value This is an empirical study. The ndings can be used to promote and mainstream
researchon cyber-bullying in Kenya.
Keywords Facebook, Kenya, Social media, Bibliometrics, Informetrics, Cyber-bullying, Research
Paper type Research paper
1. Introduction
Cyber-bullying is a form of bullyingthat occurs in cyberspace. It is an emerging aggressive
behaviour currently being experienced all over the world (Aricak et al.,2008). Research on
cyber-bullying is relatively new and, therefore, there is no unied denition of the
phenomenon. Nonetheless, several denitions exist in literature. Laibuta (2019) describes
cyber-bullying asthe sending, posting or sharing of negative, harmful,false or mean content
online about someone to embarrass or humiliate the person. According to Olweus (2012),
cyber-bullying is deemed to have occurred when a person makes derogatory comments
about other people, pokes fun at them or calls them mean and hurtful names. Also, cyber-
bullies may completely ignore or exclude a person from a group of friends on purpose, tell
This paper is a product of the Pixels hurt more than sticks and stones: Confronting cyber-bullying on
Facebookresearch project conducted by the Technical University of Kenya. This project was funded
by an unrestricted gift from Facebook.
GKMC
71,4/5
208
Received1 September 2020
Revised21 October 2020
23February 2021
Accepted1 March 2021
GlobalKnowledge, Memory and
Communication
Vol.71 No. 4/5, 2022
pp. 208-229
© Emerald Publishing Limited
2514-9342
DOI 10.1108/GKMC-08-2020-0124
The current issue and full text archive of this journal is available on Emerald Insight at:
https://www.emerald.com/insight/2514-9342.htm
lies, spread false rumours or send mean notes about them and try to make other people
dislike their victims. Olweus further explains that these actions are construed as bullying
when they occur repeatedly. Davidshofer and Murphy (2005) emphasise that in addition to
being aggressive, intentional and repeated, cyber-bullying occurs between people with
unequal power in cyberspace.
Kowalski et al. (2012) view cyber-bullyingas a form of social cruelty expressed through
online communication using networking or gamingplatforms. It is a form of psychological
violence intended to cause mentaltorture to the victims. It inicts fear and distress through
hurtful and derogatory communication (Aricak et al.,2008). In some instances, cyber-
bullying activities can cross the social line into unlawful or criminal behaviour such as
stalking, threats, harassment, impersonation, humiliation, trickery or exclusion executed
using digital communication channels (Feinberg and Robey, 2009). Piotrowski (2012)
explains that cyber-bullying is cyber-abuse behaviour intended to harass, embarrass,
threaten or socially ostracise victims. He further explains that cyber-bullying triggers
negative emotionalresponses such as sadness, fear, anxiety and humiliationin its victims.
Some researchers have focused on differentiating cyber-bullying from traditional
bullying. Domínguez-Hern
andez et al. (2018) argue that cyber-bullying is an incipient
phenomenon, which overlapswith traditional bullying. According to Dehue et al. (2008), the
main difference between traditionalbullying and cyber-bullying is anonymity. The internet
provides an opportunity for bullies to hide theiridentity and target individuals without the
fear of repercussions. Additionally, online anonymity means that cyber-bullies do not have
to rely on physical intimidation to scare their victims. Moreover, they do not need to be
stronger or swifter than their victims. Cyber-bullying also differs from traditional bullying
in that the evidence of the derogatory attacks is permanent and can be viewed online over
and over again. Similarly, cyber-bullying can be remote, widespread and sustained. The
victims can be bullied regardlessof the place or time because of the ubiquity of the internet
and social media. Unlike ofine bullying,there is no safeplace for the victims to retreatto
as the bullies can reach them even in the privacyof their own homes (Kowalski et al., 2012).
Kowalski et al. (2012) note that there has beenan increased prevalence of cyber-bullying,
especially among youngadults. In his research on the prevalence of cyber-bullying in varied
social media platforms, Petrov (2019) found that Instagram had the highest prevalence of
bullying at 42%. It was followed by Facebook at 37% and Snapchat at 32%. Dehue et al.
(2008) report that more girls are bulliedthan boys. Similarly, they report that boys are more
likely to become bullies than girls. Some scholars (Kowalski et al., 2012;Aricak et al.,2008)
also concur with this view. However, other scholars (Kowalski et al., 2014;Hinduja and
Patchin, 2008;Slonje and Smith, 2008;Beckman, Hellström and von Kobyletzki, 2020) hold
the view that there are no statistically signicantgender differences in cyber-bullying.
To better understand cyber-bullying, researchers have identied and classied types of
cyber-bullyingand the specicactions that constitute it. These include:
Exposure This occurs when a bully exposes private information of the victims,
such as mobile phone numbers or home address, leading to them being attacked,
scammed or harassed online by other unscrupulous individuals (Ondieki, 2017).
Outing This involves bullies exposing information about the sexual orientation of
Lesbian, Gay, Bisexual, Transgender (LGBT) persons without their consent (Kraus,
2014;Brandom, 2018;Berthélémy, 2019).
Exclusion or isolation This occurs when individuals are excluded from
participating in online groups or conversations by their peers (Tryon and Logan,
2015;Ouma, 2020).
Cyber-bullying
research
209

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT