form a personal profile page to represent themselves.
The concept of "virtual profile presence" makes
internet users easily interact with others (Patchin, J.
W., & Hinduja 2010b), it can make children and
adolescents vulnerable to replace their real life with
virtual reality (cyberspace). The closeness of
adolescents to cyberspace, which makes it easy to
interact and make new friends, can be a determinant
of their activity and frequency in accessing social
media.
Lots of positive aspects are obtained from the use
of ICT such as increased teaching and learning
experiences (Lazuras, L., Pyzalski, J., Barkoukis, V.,
& Tsorbatzoudis 2012), places to find various
information (Süreci 2016) and as a means to
communicate and socialize (Sari, R. S. 2016). These
positive aspects can help a person in carrying out
daily activities, whether in learning, working,
interacting, or filling spare time. But information
and communication technology can also bring up
various negative aspects for users such as addiction
to online games, addiction to internet use, the spread
of dangerous content, and cyberbullying (Lazuras,
L., Pyzalski, J., Barkoukis, V., & Tsorbatzoudis
2012).
Cyberbullying is a term used when a person or
group intentionally injures another person in the
form of writing, visual or pictures, and oral
communication using information and
communication technology (Nartgün & Cicioğlu,
2015; (Nixon 2014); (Nordahl, J., Beran, T., &
Dittrick 2013). Based on research that has been done
by many researchers shows that the phenomenon of
cyberbullying has occurred in various countries such
as in Indonesia (Rahayu 2012); (Satalina 2014), the
United States (Patchin, J. W., & Hinduja 2010a),
(Patchin, J. W., & Hinduja 2013), Japan (Udris
2015), Spain (Navarro, R., Serna, C., Martínez, V.,
& Ruiz-Oliva 2013), Turkey (Ayas 2014); (Topcu,
Ç., & Erdur-Baker 2012), Germany (Melchers, M.,
Li, M., Chen, Y., Zhang, W., & Montag 2015);
(Schultze-Krumbholz, A., & Scheithauer 2013),
Hong Kong (Wong, D. S., Chan, H. C., & Cheng
2014), China and Taiwan (Chan, H. C., & Wong
2015). This phenomenon is also very likely to occur
in other countries that have not been mentioned or
have never been studied scientifically. Facts from
studies show that cyberbullying has become a global
problem. This should be a common concern of both
the government, the surrounding environment,
school/campus/ place of work, as well as parents and
closest people.
Like traditional bullying, cyberbullying is very
easy to find because it contains extreme content,
such as; repeated threats, embarrassing posts, and /
evil words shown to the target (Patchin, J. W., &
Hinduja 2015). Although traditional bullying and
cyberbullying have similarities in form and
technique, these two things also have some
significant differences. (Livingstone, S., Mariya, S.,
& Kelly 2016) say, in the case of cyberbullying,
aggression does not need repetition. This is because
cyberbullying can be disseminated quickly and can
be shared (sharing) in the future so that it can double
the number of bystanders (audience) and the loss
suffered by the victim. Besides, unlike traditional
bullying, which is done in a place that is easily
monitored or seen, cyberbullying is done using
information and communication technologies such
as the internet, personal cellphones, multiplayer
online games, and social media (Livingstone, S.,
Mariya, S., & Kelly 2016). Of the various media
available, the most frequently used means for
perpetrators of cyberbullying is social media
(Lazuras, L., Pyzalski, J., Barkoukis, V., &
Tsorbatzoudis 2012); (Rahayu 2012). Social media
is an online media that makes it easy for users to be
able to participate, interact, share, add friends, and
create content or comments. They are very likely to
be seen by many people in the virtual world, making
it the most appropriate place for cases to occur
cyberbullying. (APJII 2016) shows that 129.2
million people (94.7%) use social media when
accessing the internet. Another difference is that
using ICT can provide opportunities for
cyberbullying actors to hide their identities or
become anonymous so that perpetrators are more
comfortable and feel safer to attack victims
(Donegan 2012); (Notar, C. E., Padgett, S., & Roden
2013); (Sari, R. S. 2016); (Udris 2015). Anonymity
gives a sense of security to the perpetrators of
cyberbullying because the victim cannot know the
identity of the perpetrator, so it will be difficult for
the victim to take the fight or protect themselves.
The last difference is, the virtual world without
limits also makes anyone have the opportunity to
become cyberbullying perpetrators whenever and
wherever they are (Nixon 2014); (Udris 2015).
According to Aftab in (Rahayu 2012) there are 3
types of cyberbullying methods, namely "(1) direct
attacks (messages will be sent directly to the target),
(2) posted and public attacks (designed to embarrass
the target by posting or posting disseminating
information or pictures that are embarrassing to the
public, and (3) cyberbullying by proxy (using others
to help disturb the victim either with the person's
knowledge or not). ”The danger of cyberbullying is
sometimes difficult to see or more complicated to be