<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">ResProt</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Res Protoc</journal-id>
      <journal-title>JMIR Research Protocols</journal-title>
      <issn pub-type="epub">1929-0748</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v9i11e23112</article-id>
      <article-id pub-id-type="pmid">33216000</article-id>
      <article-id pub-id-type="doi">10.2196/23112</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Protocol</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Protocol</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Development of a Personalized Mobile Mental Health Intervention for Workplace Cyberbullying Among Health Practitioners: Protocol for a Mixed Methods Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Wahab</surname>
            <given-names>Alawiyah</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>van Kraaij</surname>
            <given-names>Alex</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>Yun Jin</given-names>
          </name>
          <degrees>PhD, MD, MMed</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8853-6587</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Qian</surname>
            <given-names>Linchao</given-names>
          </name>
          <degrees>MD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4825-0725</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Aslam</surname>
            <given-names>Muhammad Shahzad</given-names>
          </name>
          <degrees>MPhil, PhD, PharmD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Traditional Chinese Medicine</institution>
            <institution>Xiamen University Malaysia</institution>
            <addr-line>Jalan Sunsuria, Bandar Sunsuria, Selangor</addr-line>
            <addr-line>Sepang, 43900</addr-line>
            <country>Malaysia</country>
            <phone>60 387055209</phone>
            <email>aslammuhammadshahzad@gmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2728-6726</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Traditional Chinese Medicine</institution>
        <institution>Xiamen University Malaysia</institution>
        <addr-line>Sepang</addr-line>
        <country>Malaysia</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Muhammad Shahzad Aslam <email>aslammuhammadshahzad@gmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>11</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>11</month>
        <year>2020</year>
      </pub-date>
      <volume>9</volume>
      <issue>11</issue>
      <elocation-id>e23112</elocation-id>
      <history>
        <date date-type="received">
          <day>1</day>
          <month>8</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>3</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>5</day>
          <month>9</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>10</day>
          <month>11</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Yun Jin Kim, Linchao Qian, Muhammad Shahzad Aslam. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 20.11.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Research Protocols, is properly cited. The complete bibliographic information, a link to the original publication on http://www.researchprotocols.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.researchprotocols.org/2020/11/e23112/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Workplace cyberbullying harms the psychological and social functioning of professionals working in an organization and may decrease the productivity and efficiency of daily life tasks. A recent study on trainee doctors across 8 different United Kingdom National Health Service trusts found health issues and job dissatisfaction in people who have experienced workplace cyberbullying. This disabling effect is even more noticeable in low-socioeconomic communities within low-income countries. In Malaysia, there is a need to create a personalized mobile mental health intervention program for health care professionals. These programs should be directed to prevent and decrease psychosocial issues and enhance coordination among health care professionals to solve health issues in the community.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>Our main objective is to study the pre-effects and posteffects of the Personalized Mobile Mental Health Intervention (PMMH-I) for workplace cyberbullying in public and private hospitals in Malaysia.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A hospital-based multimethod multi-analytic evidential approach is proposed, involving social and psychological health informatics. The project has been subdivided into 3 stages, starting with Phase 1, a prevalence study, followed by exploratory studies. Phase 2 consists of a quasi-experimental design, whereas the development of a prototype and their testing will be proposed in Phase 3. Each stage includes the use of quantitative and qualitative methods (mixed-method program), using SPSS (version 26.0; IBM Corp) and Stata (version 16.1; StataCorp) as tools for quantitative research, and NVivo (version 1.0; QSR International) and Atlas.ti (version 9.0.16; ATLAS.ti Scientific Software Development GmbH) for qualitative research.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The results of this study will determine the pre- and posteffectiveness of an integrated PMMH-I for health care professionals. The prototype system platform will be developed and implemented in a public and private hospital. Results from Phase 1 will be published in 2021, followed by the implementation of Phase 2 in subsequent years.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study will provide evidence and guidance regarding the implementation of a personalized mobile mental health intervention for health care professionals into routine public and private hospitals to enhance communication and resolve conflicts.</p>
        </sec>
        <sec sec-type="registered-report">
          <title>International Registered Report Identifier (IRRID)</title>
          <p>PRR1-10.2196/23112</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>workplace cyberbullying</kwd>
        <kwd>mental health</kwd>
        <kwd>personalized mobile mental health intervention</kwd>
        <kwd>health informatics</kwd>
        <kwd>Malaysia</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Suicidal behavior, depression, loneliness, anxiety, and somatic symptoms are among the most common effects of cyberbullying experienced by students [<xref ref-type="bibr" rid="ref1">1</xref>] and adolescents [<xref ref-type="bibr" rid="ref2">2</xref>]. There is a huge psychological impact (ie, depression) on people who experience workplace bullying from coworkers, such as nurses [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref6">6</xref>], health care providers, and employers [<xref ref-type="bibr" rid="ref7">7</xref>], especially among women. The prevalence of cyberbullying among first-year trainee doctors who reported experiencing it at least 1 time was 46.2% [<xref ref-type="bibr" rid="ref8">8</xref>]. Another study found a high prevalence rate (28%) of cyberbullying among a diverse workforce sample in the United States [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
        <p>Malaysia has a high mobile penetration rate due to thriving e-commerce [<xref ref-type="bibr" rid="ref10">10</xref>]. The problematic use of smartphones can lead to addiction; increased use of mobile phones in India has led to an increase in technology addiction [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. This addiction leads to depression, anxiety, stress, and self-esteem issues [<xref ref-type="bibr" rid="ref13">13</xref>]. A school-based study identified a strong correlation between pathological internet use and cyberbullying in Greece [<xref ref-type="bibr" rid="ref14">14</xref>]. However, there is a lack of evidence that pathological mobile use could lead to an increase in cyberbullying in the workplace. Most published studies, systematic reviews, and interventions are limited to cyberbullying at school, colleges, universities, or the young population.</p>
      </sec>
      <sec>
        <title>Research Questions</title>
        <p>We aim to explore the following 4 research questions in this study: (1) What is the current workplace cyberbullying status among Traditional Chinese Medicine practitioners (TCM) in Malaysia? (2) What is the pre- and postefficacy of the Personalized Mobile Mental Health Intervention (PMMH-I) on the prevalence of measurable factors (ie, depression, anxiety, and stress) in workforce cyberbullying on TCM practitioners? (3) What are the moderating and mediating factors of workplace cyberbullying on TCM practitioners? (4) What is the technological feasibility of implementing the integrated PMMH-I as a component of routine hospital-based systems?</p>
      </sec>
      <sec>
        <title>Main Intention and Objective</title>
        <p>This study's main intention is to give awareness and authority to the community of health care professionals against cyberbullying by developing a Personalized Mobile Mental Health Intervention program (PMMH-I) in partnership with all health care providers. This partnership will seek to form alliances with public and private institutions to ensure the success and continuation of the program. The PMMH-I program will aim to reduce the psychometric properties of cyberbullying through awareness and adaptation of technology.</p>
        <p>The main objective of this protocol is to develop and implement the PMMH-I program to decrease the psychometric properties of cyberbullying in the hospital-based setting in Malaysia. We hypothesize that the creation of PMMH-I programs will come about by executing a PMMH-I strategy that permits the fusion of global and local knowledge. PMMH-I promotes health care community development, thereby increasing social integration between different health care providers such as doctors, nurses, traditional and complementary medical practitioners, pharmacists, and other health care providers.</p>
      </sec>
      <sec>
        <title>Theoretical Approach</title>
        <p>We will adopt the emotion reaction model (ERM) [<xref ref-type="bibr" rid="ref15">15</xref>] as our theoretical framework, which allows researchers to explore the relationships among concepts of stressor, emotions, emotion regulators, and people who experience cyberbullying in the hospital setting in Malaysia. The ERM elucidates how emotions may produce an impact on people who experience cyberbullying in the current technological era. The adaptation of ERM depicted in <xref rid="figure1" ref-type="fig">Figure 1</xref> posits the relationship between stressor, emotions, and people who experience cyberbullying, which is mediated by emotion reappraisal and emotion suppression.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>A proposed theoretical model of the emotion reaction model.</p>
          </caption>
          <graphic xlink:href="resprot_v9i11e23112_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Ethics Approval</title>
        <p>According to the local and national ethical instructions for research (the National Committee for Clinical Research) guidelines, this study did not require ethics approval.</p>
      </sec>
      <sec>
        <title>Data Sharing Statement</title>
        <p>No data are available. All data relevant to the study are included in the manuscript.</p>
      </sec>
      <sec>
        <title>Study Plan</title>
        <p>A hospital-based multimethod multi-analytic evidential approach is proposed, involving social and psychological health informatics. The project has been subdivided into 3 stages, starting with Phase 1, a prevalence study, followed by exploratory studies. Phase 2 consists of a quasi-experimental design, whereas the development of a prototype and their testing will be proposed in Phase 3. Flow diagrams for the research design are presented in <xref rid="figure2" ref-type="fig">Figures 2</xref> and <xref rid="figure3" ref-type="fig">3</xref>. A breakdown of our anticipated timeline for each phase of the study appears in <xref rid="figure4" ref-type="fig">Figure 4</xref>.</p>
        <p>Each stage includes the use of quantitative and qualitative methods (mixed-method program), using SPSS (version 26.0; IBM Corp) and Stata (version 16.1; StataCorp) as tools for quantitative research, and NVivo (version 1.0; QSR International) and Atlas.ti (version 9.0.16; ATLAS.ti Scientific Software Development GmbH) for qualitative research.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Research flow diagram.</p>
          </caption>
          <graphic xlink:href="resprot_v9i11e23112_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Flow diagram of the experimental design; PMMH-I: Personalized Mobile Mental Health Intervention.</p>
          </caption>
          <graphic xlink:href="resprot_v9i11e23112_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Gantt chart of study-related activities.</p>
          </caption>
          <graphic xlink:href="resprot_v9i11e23112_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Phase 1: Multimethod Multi-Analytic Evidential Approach</title>
        <sec>
          <title>Objectives</title>
          <p>Phase 1 will consist of the identification and analysis of the problem. The duration of this phase will be 6 months and will include knowledge development about workplace cyberbullying among TCM practitioners.</p>
        </sec>
        <sec>
          <title>Prevalence Study</title>
          <p>The specific objectives of this study include (1) evaluating the overall prevalence rate of workplace cyberbullying and its related psychological impacts (depression, anxiety, and stress) on TCM practitioner; (2) understanding the measures associated with various forms of workplace cyberbullying on age, gender, and frequency; and (3) understanding the measure associated with workplace cyberbullying on perpetrators responsible for workplace cyberbullying. The current research will be a survey-based online cross-sectional prevalence study. TCM practitioners are considered a hard-to-reach population; thus, we will conduct a nonprobability snowball sample of 1023 adults (3% precision, 95% confidence level) according to the number of TCM practitioners, which was approximately 15,000 in 2011 [<xref ref-type="bibr" rid="ref16">16</xref>]. The Hamilton Depression Scale (HAM-D) [<xref ref-type="bibr" rid="ref17">17</xref>], the Hamilton Anxiety Scale (HAM-A) [<xref ref-type="bibr" rid="ref18">18</xref>], and the clinical anger scale [<xref ref-type="bibr" rid="ref19">19</xref>] will be used to assess the psychological impact on TCM practitioners. The Cyberbullying Questionnaire (CBQ) and a short version of a cyberbullying behavior questionnaire (CBQ-S), adapted from Jönsson et al [<xref ref-type="bibr" rid="ref20">20</xref>], will be used to identify the prevalence among TCM practitioners; these selected questionnaires were already validated in Sweden and the US adult population [<xref ref-type="bibr" rid="ref20">20</xref>]. The prevalence will also investigate the association with moderating variables (age and gender). Perpetrators of cyberbullying will also be assessed in the specific identification of the prevalence of workplace cyberbullying using the CBQ and CBQ-S questionnaires. The sampling method to understand perpetrator effects in the prevalence will similarly be addressed. The survey will also include a socioeconomic assessment, including education, income, home characteristics, and commodities. The survey will be conducted online due to the current pandemic situation caused by COVID-19, following the CHERRIES guidelines given by Gunther Eysenbach [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        </sec>
        <sec>
          <title>Exploratory Study</title>
          <p>The purpose of the exploratory study is to understand the moderating and mediating factors of workplace cyberbullying by using the ERM on TCM practitioners [<xref ref-type="bibr" rid="ref15">15</xref>]. The specific questions of this study include the following: (1) What are the relationships between emotions, workplace stressors, cyberbullying perpetration, cyberbullying victimization, and control appraisal, reappraisal, and suppression? (2) What effects do demographic factors have on emotions, workplace stressors, cyberbullying perpetration, cyberbullying victimization, and control appraisal, reappraisal, and suppression? The survey will be conducted using a convenience method, with a sample size of 384 (5% precision, 95% confidence level). A structural equation model will be developed, and each construct will be discussed. A snowball sampling method will be used to approach the target population. There will be a lucky draw at the end of the exploratory study on the participants; the 10 winners of the draw will receive an electronic power bank.</p>
          <p>This procedure was selected due to a hard-to-reach study population and a study undertaken during the COVID-19 pandemic.</p>
        </sec>
      </sec>
      <sec>
        <title>Phase 2: Program Development</title>
        <sec>
          <title>Objectives</title>
          <p>The aim of Stage 2 is to develop the anticyberbullying intervention program. Past approaches have been ineffective because of a lack of consistency within the community. To achieve this objective, a quasi-experiment with a nonequivalent pretest–post-test control group design will be conducted for a duration of 1-1.5 years (<xref rid="figure5" ref-type="fig">Figure 5</xref>).</p>
          <fig id="figure5" position="float">
            <label>Figure 5</label>
            <caption>
              <p>Overview of the nonequivalent control-group pretest–post-test study.</p>
            </caption>
            <graphic xlink:href="resprot_v9i11e23112_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Quasi-experiment with Nonequivalent Pretest–Post-test Control Group Design</title>
          <p>The study design for this stage is quasi-experimental, in which the groups are nonrandomized into intervention and control groups and selected purposively. This study will be conducted in public hospitals and private hospitals located in Malaysia. All hospitals are eligible to participate. The selection of hospitals will be randomized for the implementation of the interventions. The randomization of hospitals will be performed by online statistical computing web programming to generate the randomization schedule [<xref ref-type="bibr" rid="ref22">22</xref>]. The current methodology will help reduce selection bias in the study.</p>
          <p>This intervention study will be conducted on TCM practitioners specifically. A baseline assessment will be done, in the intervention and control hospital, to measure the burden of bullying and its correlates using the CBQ and CBQ-S. This stage will begin after the investigation of prevalence and exploratory research. First, baseline information will be collected within 3 months, and then the intervention will be monitored twice after a regular period of 6 months in order to monitor the consistency of the intervention program.</p>
          <p>The intervention program will be designed and finalized after (1) a systematic review of systematic reviews of previously published literature on bullying and the effectiveness of antibullying intervention programs; (2) the conducting of focus group discussions with TCM practitioners, patients, and other health care providers (to explore the perceptions, beliefs, and suggestions regarding bullying prevention programs); and (3) the conducting of a consultation workshop with all the stakeholders. The bullying intervention program (BIP) will pretest among 50 participants, which will include health care providers, TCM practitioners, and patients. The multicomponent hospital-based intervention strategy will be administered at 3 levels: (1) patients, (2) TCM practitioners, and (3) other health care providers. All the data of participants in this study will be password-protected and safe using Microsoft OneDrive. The recruitment of participants will follow the same procedure described for the exploratory study and prevalence study.</p>
        </sec>
      </sec>
      <sec>
        <title>Phase 3: Electronic Anticyberbullying Monitoring System</title>
        <sec>
          <title>Interface Design</title>
          <p>An expert from each stakeholder group (TCM practitioners, other health care professionals, patients, and IT experts) will be involved in the interface design, information system design, and prototype testing. The system’s overall performance and satisfaction will be acquired through questionnaires (questionnaires are available upon request). The CBQ and CBQ-S will be used to determine the effectiveness of an intervention program using a prototype (post-test). The compilation of this research will be used to design the Personalized Mobile Mental Health Intervention (PMMH-I). The duration for stage 3 will be 6 months.</p>
        </sec>
        <sec>
          <title>Literature Review on Interventions for Workplace Cyberbullying</title>
          <p>There is limited literature available on interventions for workplace cyberbullying among TCM practitioners. Most of the available literature is limited to the identification of exploratory factors, measurement factors, and increasing trends of workplace cyberbullying. Funded by the Massey University Research Fund, D’Souza et al [<xref ref-type="bibr" rid="ref23">23</xref>] discussed the issue of workplace cyberbullying in New Zealand; the study sample size was limited to 20 participants, but they predict an increase of workplace cyberbullying [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. Vranjes et al [<xref ref-type="bibr" rid="ref25">25</xref>] developed the inventory of cyberbullying acts at the workplace (ICA-W); the available results are preliminary items and build upon existing knowledge.</p>
          <p>Moreover, the results of available literature are often generalized, noncontextual, and lack practical implications [<xref ref-type="bibr" rid="ref25">25</xref>]. Another online self-report survey on workplace cyberbullying in New Zealand reports an increasing trend in workplace cyberbullying [<xref ref-type="bibr" rid="ref26">26</xref>]; however, self-reported answers may be exaggerated and lead to an increase in survey bias. The studies of Farley [<xref ref-type="bibr" rid="ref27">27</xref>], who had worked on the workplace cyberbullying measurement scale, are limited to methodological improvement in the measurement scale; these studies call for further exploratory studies. Other studies on the exploratory factors of workplace cyberbullying [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>] lack coordination between theoretical and practical applications. The subjects of cyberbullying literature in Malaysia are limited mostly to adolescents and undergraduate students, and the focus is primarily on prevalence, the determination of exploratory factors, and descriptive studies [<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref33">33</xref>]. The available studies are limited to examining the exploratory factors of workplace bullying [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
          <p>Our studies will adopt the ERM in hospitals, and will adapt personalized mobile-based IT consumerization of the ERM in workplace cyberbullying among health care professionals as the intervention. A recent study also supports mobile phone– and internet-based interventions for treating depression [<xref ref-type="bibr" rid="ref35">35</xref>]. Our study will be the first to use a personalized mobile mental health intervention for workplace cyberbullying for TCM practitioners.</p>
        </sec>
        <sec>
          <title>Data Collection and Analysis</title>
          <p>The recruitment of participants will follow the same procedure as was described for the exploratory study and prevalence study. The participant will be invited to join through a webinar to complete the questionnaire. Only the participants who completed Phase 2 will be asked to continue. The prototype will be given to them, and a brief training will be provided through a 30-minute webinar. Stage 3 participants will be limited to the Stage 2 completers in order to gauge the effectiveness of the Step 2 intervention program and whether the prototype is capable of reporting cyberbullying effectively. Thematic analysis will be done on the data yielded from the control and intervention groups. All the data of participants in this study will be password-protected and safe using Microsoft OneDrive.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>The study was submitted for funding by an internal grant from Xiamen University Malaysia in May 2020. The prevalence study for Phase 1 began in July 2020, and it will be followed by exploratory research in January 2021. The duration for Phase 1 will be 12 months. For Phase 2, the recruitment of participants will begin in July 2021. The baseline study will be completed in 4 months. The intervention will be divided into two 4-month periods to measure the consistency of the intervention. The last phase will be the development and implementation of the prototype with pilot testing and post-testing, which will have a duration of 6 months (subject to the availability of funding).</p>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <p>The impetus for this study is a need for technologically based interventions to decrease work-related cyberbullying identified by health professionals and academics. Workplace cyberbullying leads to counterproductive work behaviors [<xref ref-type="bibr" rid="ref36">36</xref>] and may lead to violence due to conflicts or work-related stress. This study will also provide insight into how job-related stress (role conflicts), team-related stress (interpersonal conflicts), and organization-related stress (organizational change) can lead to unintentional cyberbullying communication. This causes cyberbullying victimization between doctors, traditional alternative practitioners, and other health care providers. There is a lack of evidence on knowledge generation indicators, such as prevalence studies. To reduce conflict and enhance work productivity, there is a need for exploratory studies to understand the ERM and the adaptation of technological interventions such as personalized mobile mental health in hospital-based settings.</p>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Peer Review Report.</p>
        <media xlink:href="resprot_v9i11e23112_app1.pdf" xlink:title="PDF File  (Adobe PDF File), 1474 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CBQ</term>
          <def>
            <p>Cyberbullying Questionnaire</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CBQ-S</term>
          <def>
            <p>short version of a cyberbullying behavior questionnaire</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">ERM</term>
          <def>
            <p>emotion reaction model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">ICA-W</term>
          <def>
            <p>inventory of cyberbullying acts in the workplace</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PMMH-I</term>
          <def>
            <p>Personalized Mobile Mental Health Intervention program</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">TCM</term>
          <def>
            <p>Traditional Chinese Medicine</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported by the Research Management Center, Xiamen University Malaysia, grant number XMUMRF/2020-C6/ITCM/0005. The funding body had no role in the design and conduct of this study; the collection, management, analysis, and interpretation of the data; the preparation, review, and approval of the manuscript; or the decision to submit the manuscript for publication.</p>
      <p>Special thanks to Aishah Rose Marie for her perseverance in proofreading the manuscript.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>MSA was involved in conceptualization, methodology design, data collection, data analysis, prototype development, and co-writing of the paper. YK was involved in methodology design, data collection from the hospitals, and co-writing of the paper. LQ was involved in methodology design, data collection from the hospitals, and co-writing of the paper.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bauman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Toomey</surname>
              <given-names>RB</given-names>
            </name>
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>JL</given-names>
            </name>
          </person-group>
          <article-title>Associations among bullying, cyberbullying, and suicide in high school students</article-title>
          <source>J Adolesc</source>
          <year>2013</year>
          <month>04</month>
          <volume>36</volume>
          <issue>2</issue>
          <fpage>341</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1016/j.adolescence.2012.12.001</pub-id>
          <pub-id pub-id-type="medline">23332116</pub-id>
          <pub-id pub-id-type="pii">S0140-1971(12)00181-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nixon</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Current perspectives: the impact of cyberbullying on adolescent health</article-title>
          <source>AHMT</source>
          <year>2014</year>
          <month>08</month>
          <fpage>143</fpage>
          <pub-id pub-id-type="doi">10.2147/ahmt.s36456</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McKenna</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Poole</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Coverdale</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Horizontal violence: experiences of Registered Nurses in their first year of practice</article-title>
          <source>Journal of advanced nursing</source>
          <year>2003</year>
          <volume>42</volume>
          <issue>1</issue>
          <fpage>90</fpage>
          <lpage>96</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee, Youn</surname>
              <given-names>Ju</given-names>
            </name>
            <name name-style="western">
              <surname>Bernstein</surname>
              <given-names>Kunsook</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>Mihyoung</given-names>
            </name>
            <name name-style="western">
              <surname>Nokes</surname>
              <given-names>Kathleen M</given-names>
            </name>
          </person-group>
          <article-title>Bullying in the Nursing Workplace: Applying Evidence Using A Conceptual Framework</article-title>
          <source>Nursing Economics</source>
          <year>2014</year>
          <fpage>255</fpage>
          <lpage>267</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yildirim</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Bullying among nurses and its effects</article-title>
          <source>Int Nurs Rev</source>
          <year>2009</year>
          <month>12</month>
          <volume>56</volume>
          <issue>4</issue>
          <fpage>504</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1466-7657.2009.00745.x</pub-id>
          <pub-id pub-id-type="medline">19930081</pub-id>
          <pub-id pub-id-type="pii">INR745</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laschinger</surname>
              <given-names>Heather K Spence</given-names>
            </name>
            <name name-style="western">
              <surname>Grau</surname>
              <given-names>Ashley L</given-names>
            </name>
            <name name-style="western">
              <surname>Finegan</surname>
              <given-names>Joan</given-names>
            </name>
            <name name-style="western">
              <surname>Wilk</surname>
              <given-names>Piotr</given-names>
            </name>
          </person-group>
          <article-title>New graduate nurses' experiences of bullying and burnout in hospital settings</article-title>
          <source>J Adv Nurs</source>
          <year>2010</year>
          <month>12</month>
          <volume>66</volume>
          <issue>12</issue>
          <fpage>2732</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1365-2648.2010.05420.x</pub-id>
          <pub-id pub-id-type="medline">20722806</pub-id>
          <pub-id pub-id-type="pii">JAN5420</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>MacIntosh</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wuest</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gray</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Cronkhite</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Workplace bullying in health care affects the meaning of work</article-title>
          <source>Qual Health Res</source>
          <year>2010</year>
          <month>08</month>
          <day>12</day>
          <volume>20</volume>
          <issue>8</issue>
          <fpage>1128</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.1177/1049732310369804</pub-id>
          <pub-id pub-id-type="medline">20463362</pub-id>
          <pub-id pub-id-type="pii">1049732310369804</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farley</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Coyne</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Sprigg</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Axtell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Subramanian</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Exploring the impact of workplace cyberbullying on trainee doctors</article-title>
          <source>Med Educ</source>
          <year>2015</year>
          <month>04</month>
          <day>20</day>
          <volume>49</volume>
          <issue>4</issue>
          <fpage>436</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1111/medu.12666</pub-id>
          <pub-id pub-id-type="medline">25800304</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lutgen-Sandvik</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Tracy</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Alberts</surname>
              <given-names>JK</given-names>
            </name>
          </person-group>
          <article-title>Burned by Bullying in the American Workplace: Prevalence, Perception, Degree and Impact</article-title>
          <source>J Management Studies</source>
          <year>2007</year>
          <month>09</month>
          <volume>44</volume>
          <issue>6</issue>
          <fpage>837</fpage>
          <lpage>862</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1467-6486.2007.00715.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>WO</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>LS</given-names>
            </name>
          </person-group>
          <article-title>Determinants of Mobile Commerce Customer Loyalty in Malaysia</article-title>
          <source>Procedia - Social and Behavioral Sciences</source>
          <year>2016</year>
          <month>06</month>
          <volume>224</volume>
          <fpage>60</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1016/j.sbspro.2016.05.400</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Rao</surname>
              <given-names>GN</given-names>
            </name>
            <name name-style="western">
              <surname>Benegal</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Thennarasu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Technology Addiction Survey: An Emerging Concern for Raising Awareness and Promotion of Healthy Use of Technology</article-title>
          <source>Indian Journal of Psychological Medicine</source>
          <year>2020</year>
          <month>09</month>
          <day>17</day>
          <volume>39</volume>
          <issue>4</issue>
          <fpage>495</fpage>
          <lpage>499</lpage>
          <pub-id pub-id-type="doi">10.4103/ijpsym.ijpsym_171_17</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shrivastava</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Marimuthu</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Internet addiction at workplace and it implication for workers life style: Exploration from Southern India</article-title>
          <source>Asian J Psychiatr</source>
          <year>2018</year>
          <month>02</month>
          <volume>32</volume>
          <fpage>151</fpage>
          <lpage>155</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ajp.2017.11.014</pub-id>
          <pub-id pub-id-type="medline">29275219</pub-id>
          <pub-id pub-id-type="pii">S1876-2018(17)30017-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Elhai</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Dvorak</surname>
              <given-names>RD</given-names>
            </name>
            <name name-style="western">
              <surname>Levine</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Hall</surname>
              <given-names>BJ</given-names>
            </name>
          </person-group>
          <article-title>Problematic smartphone use: A conceptual overview and systematic review of relations with anxiety and depression psychopathology</article-title>
          <source>J Affect Disord</source>
          <year>2017</year>
          <month>01</month>
          <day>01</day>
          <volume>207</volume>
          <fpage>251</fpage>
          <lpage>259</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jad.2016.08.030</pub-id>
          <pub-id pub-id-type="medline">27736736</pub-id>
          <pub-id pub-id-type="pii">S0165-0327(16)30319-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tsimtsiou</surname>
              <given-names>Zoi</given-names>
            </name>
            <name name-style="western">
              <surname>Haidich</surname>
              <given-names>Anna-Bettina</given-names>
            </name>
            <name name-style="western">
              <surname>Drontsos</surname>
              <given-names>Anastasios</given-names>
            </name>
            <name name-style="western">
              <surname>Dantsi</surname>
              <given-names>Fotini</given-names>
            </name>
            <name name-style="western">
              <surname>Sekeri</surname>
              <given-names>Zafiria</given-names>
            </name>
            <name name-style="western">
              <surname>Drosos</surname>
              <given-names>Evangelos</given-names>
            </name>
            <name name-style="western">
              <surname>Trikilis</surname>
              <given-names>Nikolaos</given-names>
            </name>
            <name name-style="western">
              <surname>Dardavesis</surname>
              <given-names>Theodoros</given-names>
            </name>
            <name name-style="western">
              <surname>Nanos</surname>
              <given-names>Panagiotis</given-names>
            </name>
            <name name-style="western">
              <surname>Arvanitidou</surname>
              <given-names>Malamatenia</given-names>
            </name>
          </person-group>
          <article-title>Pathological Internet use, cyberbullying and mobile phone use in adolescence: a school-based study in Greece</article-title>
          <source>Int J Adolesc Med Health</source>
          <year>2017</year>
          <month>04</month>
          <day>22</day>
          <volume>30</volume>
          <issue>6</issue>
          <fpage>a</fpage>
          <pub-id pub-id-type="doi">10.1515/ijamh-2016-0115</pub-id>
          <pub-id pub-id-type="medline">28432846</pub-id>
          <pub-id pub-id-type="pii">/j/ijamh.ahead-of-print/ijamh-2016-0115/ijamh-2016-0115.xml</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vranjes</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Baillien</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Vandebosch</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Erreygers</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>De Witte</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>The dark side of working online: Towards a definition and an Emotion Reaction model of workplace cyberbullying</article-title>
          <source>Computers in Human Behavior</source>
          <year>2017</year>
          <month>04</month>
          <volume>69</volume>
          <fpage>324</fpage>
          <lpage>334</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.12.055</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johny</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Cheah</surname>
              <given-names>WL</given-names>
            </name>
            <name name-style="western">
              <surname>Razitasham</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Disclosure of Traditional and Complementary Medicine Use and Its Associated Factors to Medical Doctor in Primary Care Clinics in Kuching Division, Sarawak, Malaysia</article-title>
          <source>Evid Based Complement Alternat Med</source>
          <year>2017</year>
          <volume>2017</volume>
          <fpage>5146478</fpage>
          <lpage>10</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1155/2017/5146478"/>
          </comment>
          <pub-id pub-id-type="doi">10.1155/2017/5146478</pub-id>
          <pub-id pub-id-type="medline">28529529</pub-id>
          <pub-id pub-id-type="pmcid">PMC5424170</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hamilton</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A rating scale for depression</article-title>
          <source>J Neurol Neurosurg Psychiatry</source>
          <year>1960</year>
          <month>02</month>
          <day>01</day>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>56</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://jnnp.bmj.com/lookup/pmidlookup?view=long&#38;pmid=14399272"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/jnnp.23.1.56</pub-id>
          <pub-id pub-id-type="medline">14399272</pub-id>
          <pub-id pub-id-type="pmcid">PMC495331</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>HAMILTON</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The assessment of anxiety states by rating</article-title>
          <source>Br J Med Psychol</source>
          <year>1959</year>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>50</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1111/j.2044-8341.1959.tb00467.x</pub-id>
          <pub-id pub-id-type="medline">13638508</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snell</surname>
              <given-names>WE</given-names>
            </name>
            <name name-style="western">
              <surname>Gum</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Shuck</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Mosley</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Kite</surname>
              <given-names>TL</given-names>
            </name>
          </person-group>
          <article-title>The clinical anger scale: Preliminary reliability and validity</article-title>
          <source>J. Clin. Psychol</source>
          <year>1995</year>
          <month>03</month>
          <volume>51</volume>
          <issue>2</issue>
          <fpage>215</fpage>
          <lpage>226</lpage>
          <pub-id pub-id-type="doi">10.1002/1097-4679(199503)51:2&#60;215::aid-jclp2270510211&#62;3.0.co;2-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jönsson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Muhonen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Forssell</surname>
              <given-names>RC</given-names>
            </name>
            <name name-style="western">
              <surname>Bäckström</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Assessing Exposure to Bullying through Digital Devices in Working Life: Two Versions of a Cyberbullying Questionnaire (CBQ)</article-title>
          <source>PSYCH</source>
          <year>2017</year>
          <volume>08</volume>
          <issue>03</issue>
          <fpage>477</fpage>
          <lpage>494</lpage>
          <pub-id pub-id-type="doi">10.4236/psych.2017.83030</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eysenbach</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Improving the quality of Web surveys: the Checklist for Reporting Results of Internet E-Surveys (CHERRIES)</article-title>
          <source>J Med Internet Res</source>
          <year>2004</year>
          <month>09</month>
          <day>29</day>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>e34</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2004/3/e34/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.6.3.e34</pub-id>
          <pub-id pub-id-type="medline">15471760</pub-id>
          <pub-id pub-id-type="pii">v6e34</pub-id>
          <pub-id pub-id-type="pmcid">PMC1550605</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Suresh</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>An overview of randomization techniques: An unbiased assessment of outcome in clinical research</article-title>
          <source>J Hum Reprod Sci</source>
          <year>2011</year>
          <month>01</month>
          <volume>4</volume>
          <issue>1</issue>
          <fpage>8</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jhrsonline.org/article.asp?issn=0974-1208;year=2011;volume=4;issue=1;spage=8;epage=11;aulast=Suresh"/>
          </comment>
          <pub-id pub-id-type="doi">10.4103/0974-1208.82352</pub-id>
          <pub-id pub-id-type="medline">21772732</pub-id>
          <pub-id pub-id-type="pii">JHRS-4-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC3136079</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Natalia</surname>
              <given-names>D’Souza</given-names>
            </name>
            <name name-style="western">
              <surname>Darryl</surname>
              <given-names>Forsyth</given-names>
            </name>
            <name name-style="western">
              <surname>David</surname>
              <given-names>Tappin</given-names>
            </name>
            <name name-style="western">
              <surname>Bevan</surname>
              <given-names>Catley</given-names>
            </name>
          </person-group>
          <article-title>Engaging industry specialists on the issue of workplace cyberbullying — a New Zealand study</article-title>
          <source>Journal of Health, Safety and Environment</source>
          <year>2017</year>
          <volume>33</volume>
          <issue>2</issue>
          <fpage>105</fpage>
          <lpage>124</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Natalia</surname>
              <given-names>D’Souza</given-names>
            </name>
            <name name-style="western">
              <surname>Darryl</surname>
              <given-names>Forsyth</given-names>
            </name>
            <name name-style="western">
              <surname>David</surname>
              <given-names>Tappin</given-names>
            </name>
            <name name-style="western">
              <surname>Bevan</surname>
              <given-names>Catley</given-names>
            </name>
          </person-group>
          <source>Workplace Cyberbullying in New Zealand Nursing: A Report for Participants and Professional Bodies</source>
          <access-date>2020-05-05</access-date>
          <publisher-loc>Auckland, New Zealand</publisher-loc>
          <publisher-name>Massey University, School of Management</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.massey.ac.nz/shadomx/apps/fms/fmsdownload.cfm?file_uuid=D5ECA077-0C0D-4603-894F-AC2EBADE3FBE">https://www.massey.ac.nz/shadomx/apps/fms/fmsdownload.cfm?file_uuid=D5ECA077-0C0D-4603-894F-AC2EBADE3FBE</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vranjes</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Baillien</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Vandebosch</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Erreygers</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>De Witte</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>When workplace bullying goes online: construction and validation of the Inventory of Cyberbullying Acts at Work (ICA-W)</article-title>
          <source>European Journal of Work and Organizational Psychology</source>
          <year>2017</year>
          <month>08</month>
          <day>08</day>
          <volume>27</volume>
          <issue>1</issue>
          <fpage>28</fpage>
          <lpage>39</lpage>
          <pub-id pub-id-type="doi">10.1080/1359432x.2017.1363185</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gardner</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>O'Driscoll</surname>
              <given-names>Michael</given-names>
            </name>
            <name name-style="western">
              <surname>Cooper-Thomas</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Roche</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bentley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Catley</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Teo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Trenberth</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Predictors of Workplace Bullying and Cyber-Bullying in New Zealand</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2016</year>
          <month>04</month>
          <day>27</day>
          <volume>13</volume>
          <issue>5</issue>
          <fpage>448</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph13050448"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph13050448</pub-id>
          <pub-id pub-id-type="medline">27128929</pub-id>
          <pub-id pub-id-type="pii">ijerph13050448</pub-id>
          <pub-id pub-id-type="pmcid">PMC4881073</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farley</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Coyne</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Axtell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sprigg</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Design, development and validation of a workplace cyberbullying measure, the WCM</article-title>
          <source>Work &#38; Stress</source>
          <year>2016</year>
          <month>11</month>
          <day>22</day>
          <volume>30</volume>
          <issue>4</issue>
          <fpage>293</fpage>
          <lpage>317</lpage>
          <pub-id pub-id-type="doi">10.1080/02678373.2016.1255998</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coyne</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Farley</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Axtell</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sprigg</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Best</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kwok</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: a dysempowerment approach</article-title>
          <source>The International Journal of Human Resource Management</source>
          <year>2016</year>
          <month>02</month>
          <day>26</day>
          <volume>28</volume>
          <issue>7</issue>
          <fpage>945</fpage>
          <lpage>972</lpage>
          <pub-id pub-id-type="doi">10.1080/09585192.2015.1116454</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snyman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Loh</surname>
              <given-names>J(</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying at work: The mediating role of optimism between cyberbullying and job outcomes</article-title>
          <source>Computers in Human Behavior</source>
          <year>2015</year>
          <month>12</month>
          <volume>53</volume>
          <fpage>161</fpage>
          <lpage>168</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.06.050</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balakrishnan</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Actions, emotional reactions and cyberbullying – From the lens of bullies, victims, bully-victims and bystanders among Malaysian young adults</article-title>
          <source>Telematics and Informatics</source>
          <year>2018</year>
          <month>08</month>
          <volume>35</volume>
          <issue>5</issue>
          <fpage>1190</fpage>
          <lpage>1200</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2018.02.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Mohamad</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>MF</given-names>
            </name>
            <name name-style="western">
              <surname>Salleh</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Sulaiman</surname>
              <given-names>NL</given-names>
            </name>
            <name name-style="western">
              <surname>Rosli</surname>
              <given-names>DI</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>WVS</given-names>
            </name>
          </person-group>
          <article-title>Prevalence of Cyberbullying among Students in Malaysian Higher Learning Institutions</article-title>
          <source>adv sci lett</source>
          <year>2017</year>
          <month>02</month>
          <day>01</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>781</fpage>
          <lpage>784</lpage>
          <pub-id pub-id-type="doi">10.1166/asl.2017.7492</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abu Bakar</surname>
              <given-names>HS</given-names>
            </name>
          </person-group>
          <article-title>The emergence themes of cyberbullying among adolescences</article-title>
          <source>International Journal of Adolescence and Youth</source>
          <year>2015</year>
          <month>03</month>
          <day>02</day>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>393</fpage>
          <lpage>406</lpage>
          <pub-id pub-id-type="doi">10.1080/02673843.2014.992027</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balakrishnan</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying among young adults in Malaysia: The roles of gender, age and Internet frequency</article-title>
          <source>Computers in Human Behavior</source>
          <year>2015</year>
          <month>05</month>
          <volume>46</volume>
          <fpage>149</fpage>
          <lpage>157</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.01.021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hidzir</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Jaafar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jalali</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dahalan</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>An Exploratory Study on the Relationship between the Personal Factors of the Perpetrator and Workplace Bullying</article-title>
          <source>JP</source>
          <year>2017</year>
          <volume>49</volume>
          <fpage>67</fpage>
          <lpage>76</lpage>
          <pub-id pub-id-type="doi">10.17576/pengurusan-2017-49-06</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goldin</surname>
              <given-names>PR</given-names>
            </name>
            <name name-style="western">
              <surname>Lindholm</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ranta</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hilgert</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Helteenvuori</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Raevuori</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Feasibility of a Therapist-Supported, Mobile Phone-Delivered Online Intervention for Depression: Longitudinal Observational Study</article-title>
          <source>JMIR Form Res</source>
          <year>2019</year>
          <month>01</month>
          <day>22</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>e11509</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://formative.jmir.org/2019/1/e11509/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11509</pub-id>
          <pub-id pub-id-type="medline">30682726</pub-id>
          <pub-id pub-id-type="pii">v3i1e11509</pub-id>
          <pub-id pub-id-type="pmcid">PMC6362390</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Keskin</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Akgün</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Ayar</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kayman</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying Victimization, Counterproductive Work Behaviours and Emotional Intelligence at Workplace</article-title>
          <source>Procedia - Social and Behavioral Sciences</source>
          <year>2016</year>
          <month>11</month>
          <volume>235</volume>
          <fpage>281</fpage>
          <lpage>287</lpage>
          <pub-id pub-id-type="doi">10.1016/j.sbspro.2016.11.031</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
