BULLYING BY TWITTER USERS IN THE SELENA GOMEZ AND HAILEY BIEBER DRAMA
DOI:
https://doi.org/10.26618/exposure.v13i1.14110Keywords:
Cyberbullying, impoliteness, Twitter, Social Media.Abstract
This study investigates the types and motivations of cyberbullying expressions used by Twitter users in the Selena Gomez and Hailey Bieber drama. Employing a descriptive qualitative approach, the research analyses transcripts of Twitter comments to understand the underlying motives behind the observed bullying behaviour. The findings have revealed several key motives including fanaticism towards idols. Strong identification with and defence of preferred idols can induce aggressive responses towards perceived threats, leading to attacks on rival fans or their idols. Emotional reactivity that encouuunters tweets perceived as disrespectful or harmful towards their idols can trigger anger and frustration, driving users to engage in cyberbullying as a means of retaliation. Witnessing the success or popularity of other idol groups or their fans can trigger feelings of jealousy, prompting some users to engage in cyberbullying to diminish their rivals' perceived advantages. Engaging in aggressive online behaviour and "winning" arguments against perceived opponents can provide some users with a sense of validation and satisfaction, further reinforcing the cycle of cyberbullying.References
Bauman, S., & Del Rio, A. (2006). Preservice teachers' responses to bullying scenarios: Comparing physical, verbal, and relational bullying. Journal of educational psychology, 98(1), 219.
Bellmore, A., Calvin, A. J., Xu, J. M., & Zhu, X. (2015). The five W’s of “bullying” on Twitter: Who, what, why, where, and when. Computers in human behavior, 44, 305-314.
Blanco, K., Briceno, A., Steele, A., Tapia, J., McKay, J., Towers, S., & Yong, K. E. (2014). The dynamics of offensive messages in the world of social media: The control of cyberbullying on twitter. arXiv preprint arXiv:1408.0694.
Brezina, C. (2016). Helping a Friend Who Is Being Bullied. The Rosen Publishing Group, Inc.
Calvin, A. J., Bellmore, A., Xu, J. M., & Zhu, X. (2015). # bully: Uses of hashtags in posts about bullying on Twitter. Journal of School Violence, 14(1), 133-153.
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017, June). Mean birds: Detecting aggression and bullying on twitter. In Proceedings of the 2017 ACM on web science conference (pp. 13-22).
Chelmis, C., Zois, D. S., & Yao, M. (2017, November). Mining patterns of cyberbullying on twitter. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 126-133). IEEE.
Constanze Schlüter, C., Kraag, G., & Schmidt, J., (2021). Body Shaming: an Exploratory Study on its Definition and Classification. International Journal of Bullying Prevention
https://doi.org/10.1007/s42380-021-00109-3.
Craig, W., Boniel-Nissim, M., King, N., Walsh, S. D., Boer, M., Donnelly, P. D., ... & Pickett, W. (2020). Social media use and cyber-bullying: A cross-national analysis of young people in 42 countries. Journal of Adolescent Health, 66(6), S100-S108.
Culpeper, J. (1996). Towards an anatomy of impoliteness. Journal of Pragmatics, 25, 349-367.
Dhungana Sainju, K. (2020, October). Beyond the schoolyard: A multilevel examination of individual, school and school district variables associated with traditional and cyber peer aggression. In Child & Youth Care Forum (Vol. 49, pp. 769-797). Springer US.
Duggan, M. (2017). Online harassment 2017.
Gillespie, G. L., Grubb, P. L., Brown, K., Boesch, M. C., & Ulrich, D. (2017). “Nurses eat their young”: a novel bullying educational program for student nurses. Journal of nursing education and practice, 7(7), 11.
Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional bullying and cyberbullying: Identification of risk groups for adjustment problems. Zeitschrift für Psychologie/Journal of Psychology, 217(4), 205-213.
Hutchinson, M., & Jackson, D. (2015). The construction and legitimation of workplace bullying in the public sector: insight into power dynamics and organisational failures in health and social care. Nursing inquiry, 22(1), 13-26.
Khairunnissa, S., Rahman, A., Siregar, M., Tanjung, A. S., & Shawal, M. (2018). Law on Cyberbullying in Indonesia , Malaysia , and Brunei Darusallam. International Conference Of Asean Perspective And Policy, 1(1), 63–68.
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychological bulletin, 140(4), 1073.
McHugh, M. C., Saperstein, S. L., & Gold, R. S. (2019). OMG U# Cyberbully! An exploration of public discourse about cyberbullying on Twitter. Health Education & Behavior, 46(1), 97-105.
Mukheef, A. A. (2021). A Socio-pragmatic Study of Cyber Bullying in Oprah ’ s – Harry & Meghan 2020 Interview ’ s Commenters. ٢٠٢١, 47–57.
Okorie, N., & Ekeanyanwu, N. T. (2014). ICT, Cyber-bullying, and Self-Disclosure: An experiential study of Twitter. Covenant Journal of Communication.
Saravanaraj, A., Sheeba, J. I., & Devaneyan, S. P. (2016). Automatic detection of cyberbullying from twitter. International Journal of Computer Science and Information Technology & Security (IJCSITS).
Sigmund, F. (2006). Pengantar umum psikoanalisis.
Smith, P. K. (2016). Bullying: Definition, types, causes, consequences and intervention. Social and Personality Psychology Compass, 10(9), 519-532.
Tim Yayasan Semai Jiwa Amini. (2008). Bullying: mengatasi kekerasan di sekolah dan lingkungan sekitar anak. Grasindo.
Trihapsari, E. (2016). Klasifikasi Cyber Bullying Klasifikasi Cyber Bullying Pada Media Sosial Twitter Dengan Menggunakan Algoritma Naïve Bayes. 1–89. https://fdokumen.com/document/klasifikasi-cyber-bullying-pada-media-sosial-thesispdf-sosial-twitter-dengan-menggunakan.html?page=1
Walker, J. A., & Jeske, D. (2016). Understanding bystanders' willingness to intervene in traditional and cyberbullying scenarios. International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), 6(2), 22-38.
Xu, J. M., Huang, H. C., Bellmore, A., & Zhu, X. (2014, May). School bullying in Twitter and Weibo: A comparative study. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 8, No. 1, pp. 631-634).
Xu, J. M., Jun, K. S., Zhu, X., & Bellmore, A. (2012, June). Learning from bullying traces in social media. In Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies (pp. 656-666).
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
In order to assure the highest standards for published articles, a peer review policy is applied. In pursue of the compliance with academic standards, all parties involved in the publishing process (the authors, the editors and the editorial board and the reviewers) agree to meet the responsibilities stated below in accordance to the Journal publication ethics and malpractice statement.
Duties of Authors:
- The author(s) warrant that the submitted article is an original work, which has not been previously published, and that they have obtained an agreement from any co-author(s) prior to the manuscript’s submission;
- The author(s) should not submit articles describing essentially the same research to more than one journal;
- The authors(s) make certain that the manuscript meets the terms of the Manuscript Submission Guideline regarding appropriate academic citation and that no copyright infringement occurs;
- The authors(s) should inform the editors about any conflict of interests and report any errors they subsequently, discover in their manuscript.
Duties of Editors and the Editorial Board:
- The editors, together with the editorial board, are responsible for deciding upon the publication or rejection of the submitted manuscripts based only on their originality, significance, and relevance to the domains of the journal;
- The editors evaluate the manuscripts compliance with academic criteria, the domains of the journal and the guidelines;
- The editors must at all times respect the confidentiality of any information pertaining to the submitted manuscripts;
- The editors assign the review of each manuscript to two reviewers chosen according to their domains of expertise. The editors must take into account any conflict of interest reported by the authors and the reviewers.
- The editors must ensure that the comments and recommendations of the reviewers are sent to the author(s) in due time and that the manuscripts are returned to the editors, who take the final decision to publish them or not.
Authors are permitted and encouraged to post online a pre-publication manuscript (but not the Publisher’s final formatted PDF version of the Work) in institutional repositories or on their Websites prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see The Effect of Open Access). Any such posting made before acceptance and publication of the Work shall be updated upon publication to include a reference to the Publisher-assigned DOI (Digital Object Identifier) and a link to the online abstract for the final published Work in the Journal.