-Seattle Health Plans currently uses zero-debt financing. Its operating income (EBIT) is $1 million, and it pays taxes at a 40 percent rate. It has $5 million in assets and, because it is all-equity financed, $5 million in equity. Suppose the firm is considering replacing half of its equity with dept financing bearing an interest rate of 8 percent.
a. What impact would the new capital structure have on the firm’s net income, total dollar return to investors, and ROE?
b. Redo the analysis, but now assume that the debt financing would cost 15 percent.
c. Return to the initial 8 percent interest rate. Now, assume that EBIT could be as low as $500,000 (with a probability of 20 percent) or as high as $1.5 million (with a probability of 20 percent). There remains a 60 percent chance that EBIT would be $1 million. Redo the analysis for each level of EBIT, and find the expected values for the firm’s income, total dollar return to investors, ROE. What lesson about capital structure and risk does this illustration provide?
d. Repeat the analysis required for Part a, but now assume that Seattle Health Plans is a not-for-profit corporation and pays no taxes. Compare the results with those obtained in Part a.
-Morningside Nursing Home, a not-for-profit corporation, Its tax exempt debt currently requires an interest rate of 6.2 percent and its target capital structure calls for 60 percent debt financing and 40 percent equity (fund Capital) financing. The estimated costs of equity for selected investors owned healthcare companies are given below: Glaxo Wellcome 15.0% Beverly Enterprises 16.4 HEALTHSOUTH 17.4 Humana 18.8
a. What is the best estimate for Morningside’s cost of equity?
b. What is the firm’s corporate cost of capital?
Electronic Bullying and Victimization and Life Satisfaction in Middle School Students
Page Malmsjo Moore • E. Scott Huebner • Kimberly J. Hills
Accepted: 1 May 2011 / Published online: 25 May 2011 � Springer Science+Business Media B.V. 2011
Abstract This study examined the nature and prevalence of electronic bullying and victimization in a sample of middle school students in a southeastern USA school. Rela-
tionships among measures of electronic bullying and victimization and global and domain-
specific life satisfaction were also investigated. A total of 855 7th and 8th grade US
students responded to questions regarding global and domain-based life satisfaction,
electronic bullying and victimization behaviors. Although a majority of students reported
not engaging in or being the victim of electronic bullying, the small percentage of students
who did report these behaviors as being problematic indicated that the behaviors occurred
several times a week. Statistically significant correlates of electronic bullying were self-
reported grades in school, gender, and parent marital status. Significant correlates of
victimization were self-reported grades in school, parent marital status, and ethnicity. The
results suggested modest, but pervasive relationships between experiences of electronic
bullying and victimization and adolescents’ life satisfaction reports across a variety of
important life domains. When the effects of demographic variables were controlled, the
relationship between electronic victimization and global life satisfaction became non-
significant, suggesting that global life satisfaction reports may mask the effects of specific
life satisfaction domains.
Keywords Bullying � Electronic bullying � Electronic victimization � Life satisfaction
1 Introduction
On an annual basis in the USA, researchers estimate that more than 3.7 million students in
grades 6–10 engage in moderate or serious bullying while more than 3.2 million students
are victims of moderate or serious bullying (Nansel et al. 2001). Research in the United
Kingdom has also shown that during adolescence, a great deal of violence in schools is due
to students bullying their peers (Boulton 1999). One contemporary meta-analysis of studies
P. M. Moore � E. S. Huebner (&) � K. J. Hills Department of Psychology, University of South Carolina, Columbia, SC 29208, USA e-mail: [email protected]
123
Soc Indic Res (2012) 107:429–447 DOI 10.1007/s11205-011-9856-z
of bullying behaviors spanning nine countries found that the prevalence of bullying others
or having been bullied (at least once in the last 2 months) was 20.8% for physical bullying,
53.6% for verbal bullying, 51.4% for social bullying, and 13.6% for electronic bullying
(Wang et al. 2009). A survey of almost 16,000 USA students in grades 6–10 found that
almost 30% of their sample reported frequent involvement in some form of bullying. More
specifically, approximately 13% were bullies, 10.6% were victims, and 6% were bully/
victims (i.e., bullying others as well as experience bullying; Nansel et al. 2001). Overall,
school bullying has been identified as a major concern among adolescents and school
professionals in multiple nations (Boulton et al. 2008; Hawker and Boulton 2000).
Based on research findings, it has been said that ‘‘bullying may be the most prevalent
form of violence in the schools’’ (Batsche and Knoff 1994, p. 166). One disturbing
reminder of potential violence associated with bullying is found in the research results of a
study conducted by the United States Secret Service. In an effort to better understand
bullying behavior and the potential consequences, the United States Secret Service
embarked on an in-depth investigation of 41 school shooters with incidents having
occurred between 1974 and 2000. Through interviews of both friends and family members,
it was found that 71% of the shooters had been targets of bullying (Vossekuil et al. 2002).
Unfortunately, as the previously mentioned research illustrates, bullying in schools is both
serious and pervasive in nature.
Although the number of students engaged in or targeted by bullying behaviors is
problematic in and of itself, the potential impact on outcomes such as school achievement,
prosocial skills, and psychological well-being for both the victims and perpetrators makes
this phenomenon even more significant (Boulton et al. 2008; Hawker and Boulton 2000).
Chronic victims of bullying report various physical and mental health problems, including
low self-esteem and depression. Victims are also more likely to bring weapons to school
and contemplate suicide as compared to their non-bullied peers (Olweus 1993). Interest-
ingly, negative outcomes associated with bullying behaviors are not limited to the victims
as many often believe. Research has also found that students who engage in bullying
behaviors are more likely to underachieve in school, drop out of school, engage in
delinquent or criminal acts, and become abusive spouses or parents (Olweus 1993).
Despite the fact that research on traditional bullying is vast in comparison, only a
handful of studies have focused specifically on electronic bullying among children and
youth (Kowalski and Limber 2007). In the USA alone, approximately 87% of children
aged 12–17 use the internet daily and 45% own cell phones (Lenhart et al. 2005). Even
though technology is a part of almost every student’s life, relatively little empirical
research related to electronic bullying has been done (Nansel et al. 2001; Williams and
Guerra 2007; Ybarra and Mitchell 2004a). Considered a contemporary form of bullying,
electronic bullying, often referred to as cyber-bullying or online social cruelty, includes
bullying through e-mail, instant messaging, websites, chat rooms, or through digital images
or messages sent via cell phone (Kowalski and Limber 2007). According to the Director for
the Center for Safe and Responsible Internet Use, electronic bullying is discourse that is
‘‘defamatory, constitutes bullying, harassment, or discrimination, discloses personal
information, or contains offensive, vulgar or derogatory comments’’ (Willard 2003, p. 66).
Essentially, youth utilize electronic means of bullying in order to insult, threaten, taunt,
harass, or intimidate a peer (Raskauskas and Stoltz 2007).
Hinduja and Patchin (2008) suggested that this newer form of bullying is the ‘‘unfor-
tunate by-product of the union of adolescent aggression and electronic communication, and
its growth is giving cause for concern’’ (p. 131). One recent survey indicated that more
than 13 million children in the USA aged 6–17 were victims of electronic bullying.
430 P. M. Moore et al.
123
Overall, approximately one-sixth of primary school age children and one-third of teens
reported that they had been threatened, called names, or embarrassed by information
shared about them on the internet (Fight Crime: Invest in Kids 2006). Although a large
portion of actual electronic bullying behaviors occur outside of the school setting,
researchers suggest that these incidents appear to relate to the functioning of students at
school as well as the school environment itself, highlighting the importance of investi-
gating this aggressive behavior within the school system (David-Ferdon and Hertz 2007).
Electronic bullying has been distinguished from traditional forms of bullying. To begin,
traditional bullying is typically defined as verbal or physical behaviors that occur
repeatedly over time, which are characterized by an imbalance of strength or power
(Olweus 1993). Bullying occurs when a student is repeatedly harmed in some way, either
psychologically and/or physically, by another student or a group of students. Typically,
bullies tend to be physically, psychologically, or socially stronger than the children they
bully. Traditional bullying can also include more overt physical acts such as shoving and
hitting, as well as verbal abuse, such as name-calling and taunting. Traditional bullying can
also take on more indirect forms, including rumor spreading and social exclusion (Olweus
1993, 1994).
Results of one anonymous web-based survey of 12–17 year old youth found that, within
a year’s time, 72% of respondents reported at least one online incident of bullying, 85% of
whom also experienced bullying in school (Juvonen and Gross 2008). Researchers found
that, when controlling for internet use, repeated experiences of school-based bullying
increased the likelihood of repeated electronic bullying, which indicates an overlap in
experiences across both contexts. An 85% overlap between online and in-school bullying
suggests that electronic space is not an independent environment, but rather it seems to be
another forum that essentially extends the school grounds (Juvonen and Gross 2008).
Interestingly, students’ roles in traditional bullying have also been found to predict the
same roles in electronic bullying (Raskauskas and Stoltz 2007). For example, traditional
bullies tend to also be electronic bullies while victims of traditional bullying are also likely
to be victims of electronic bullying (Beran and Li 2005). Approximately 64% of students
surveyed in another study reported that electronic bullying was most likely to start at
school as traditional bullying and subsequently continue at home by the same students
(Cassidy et al. 2009). For some victims of bullying, the internet may just be an ‘‘extension
of the schoolyard, with victimization continuing after the bell and on into the night’’
(Ybarra and Mitchell 2004a, p. 1313).
Although similar in many ways, the literature also establishes that meaningful differ-
ences exist between traditional bullying and electronic bullying, further highlighting the
need for additional research (Brown et al. 2006; Kowalski and Limber 2007). One of the
primary differences between these forms of bullying is the continuous, unrelenting nature
of electronic bullying. Essentially, traditional bullying is typically confined to a particular
place or time, whereas electronic bullying is almost limitless in nature (Kowalski et al.
2008). Victims of electronic bullying cannot easily escape as this form of harassment can
occur in almost any context, at any time of the day via electronic means (Brown et al.
2006; Willard 2006). Another significant difference between traditional bullying and
bullying via electronic means involves the component of anonymity (Brown et al. 2006;
Kowalski and Limber 2007; Ybarra and Mitchell 2004a). Unlike traditional forms of
bullying, research has found that almost half of the victims of electronic bullying do not
know the identity of the perpetrator (Kowalski and Limber 2007). Because individuals are
hidden behind the security and anonymity of a computer screen, youth engaged in online
bullying might act differently than they normally would, letting go of traditional
Electronic Bullying and Life Satisfaction 431
123
inhibitions (Berson and Berson 2005; Ybarra and Mitchell 2004b). Interestingly, the
internet may actually provide an opportunity for victims of electronic bullying to com-
municate without fear, allowing for possible revenge against perpetrators (Kowalski and
Limber 2007). Although very preliminary, some research has suggested that electronic
bullying may in fact be more damaging to youth compared to traditional bullying, resulting
in issues such as anxiety, anger, low self-esteem, depression, poor academic performance,
school absenteeism, and even suicide (Willard 2006).
Researchers have begun to explore the prevalence and correlates of electronic bullying
and victimization. A study conducted by the United States Department of Education found
that 90% of children ages 5–17 use computers, and 59% (31 million) have access to the
Internet (DeBell and Chapman 2003). With literally millions of children utilizing the
internet, it is critical to understand prevalence rates as well as possible factors that con-
tribute to perpetration and victimization. In general, prevalence rates indicate that internet
bullying and victimization rates are around 25%, and that this form of bullying has become
a global phenomenon (Aricak et al. 2008; Kowalski and Limber 2007; Willard 2006). One
study of electronic bullying among middle school students found that 22% of students
reported involvement in electronic bullying, including 4% as bullies, 11% as victims, and
7% as both bully-victim (Kowalski and Limber 2007). Results from a survey of 5th, 8th,
and 11th grade students found that 9.4% of the students admitted that they had bullied
others via e-mail or instant messaging (Williams and Guerra 2007). Overall, it has been
estimated that more than 13 million children in the USA ages 6–17 are victims of elec-
tronic bullying (Fight Crime: Invest in Kids 2006).
Understanding the nature and frequencies of electronic bullying is important. It is also
important to understand the correlates and potential warning signs associated with per-
petration and victimization. Warning signs related to victimization include withdrawing
from friends and family members, becoming upset about going to school or going outside,
avoiding discussions related to activities on the computer, showing feelings of anger,
anxiety, or depression following use of the computer, and suddenly not using the computer
anymore (Hinduja and Patchin 2007a). In addition, other signs of victimization include
having been a victim of traditional bullying at school, a decrease in academic performance,
and avoidance of school (Kowalski and Limber 2007). Warning signs related to offending
behavior include using the computer at all hours, creating multiple online accounts, and
quickly closing or switching screens in the presence of others, avoiding discussions related
to activities on the computer, and becoming unusually upset if access to the computer is
restricted (Hinduja and Patchin 2007a).
Research has suggested potential warning signs for electronic victimization as well.
Overall, research indicates that victims tend to be excluded and rejected by their peers
more than bullies (Hawker and Boulton 2000; Juvonen et al. 2003). Victims of electronic
bullying may also withdraw from school activities, and become ill, depressed, or even
suicidal (Willard 2006). As part of a statewide bullying prevention initiative in Colorado,
youth in grades 5, 8, and 11 were surveyed regarding internet bullying, physical bullying,
and verbal bullying. The results revealed that internet bullying peaked in middle school
and declined in high school, making adolescents a particularly vulnerable population.
Interestingly, all three forms of bullying were significantly related to negative peer support,
negative school climate, and normative beliefs condoning bullying, which may serve as
potential risk indicators (Williams and Guerra 2007). Furthermore, the amount of time a
youth spends on the internet as well as their level of computer proficiency have both been
implicated in victimization (Wang et al. 2009).
432 P. M. Moore et al.
123
A handful of studies has investigated the presumed outcomes of electronic bullying and
victimization. Electronic bullying has been linked to multiple maladaptive emotional,
psychological, and behavioral outcomes (Patchin and Hinduja 2006). Similar to traditional
bullying, victims of electronic bullying have been found to display more negative psy-
chological and emotional outcomes, particularly, feelings of anger, frustration, and
depression (Hinduja and Patchin 2007a). Victims of electronic bullying have also been
found to be more likely to report skipping school as well as receiving two or more
detentions or suspensions. Furthermore, youth who report being victims of internet
harassment were found to be eight times more likely than other youth to report carrying a
weapon to school (Wolak et al. 2007; Ybarra et al. 2007a, b).
Victims are not the only at risk population facing negative consequences in regards to
this modern form of bullying. Research suggests that students that engaging in internet
bullying also experience multiple psychosocial challenges including substance use,
delinquency, and poor parent–child relationships (Aricak et al. 2008; Raskauskas and
Stoltz 2007; Ybarra and Mitchell 2004a, b).
Although previous research has examined relationships between electronic bullying and
victimization and a variety of traditional indicators of adolescent mental health, there have
been few studies investigating relationships to individual differences in adolescents’ life
satisfaction (Willkins-Shurmer et al. 2003). Life satisfaction is defined as an individual’s
cognitive appraisal of the positivity of her or his own quality of life overall or with specific
domains, such as family, friends, or community experiences (Diener 1984). Although
related to measures of mental health, life satisfaction measures are distinguishable from
measures of depression, anxiety, and so forth. Contextualized within the emerging positive
psychology perspective, life satisfaction measures extend beyond assessments of the
presence of psychological symptoms or low levels of life satisfaction to assessments that
differentiate satisfaction levels above a neutral point (i.e., the absence of dissatisfaction).
Thus, life satisfaction measures can be designed to differentiate among satisfaction levels
that range from ‘‘low’’ to ‘‘neutral’’ to ‘‘mildly high’’ to ‘‘very high’’, and so forth. In this
manner, life satisfaction measures provide a more finely grained analysis of individuals’
well-being (Diener 1984).
The few studies that have investigated life satisfaction and bullying behaviors have
focused on the victimization component, excluding the possible link between life satis-
faction and perpetration. In one of the only empirical studies that examined the relation-
ships between bullying and adolescents’ life satisfaction, Flaspohler et al. (2009) found
that students who bully and/or are bullied experience reduced life satisfaction and support
from peers and teachers as compared to children who are neither victims nor perpetrators
of bullying. After controlling for gender and grade, students who were not engaged in
bullying reported higher levels of life satisfaction as compared to peers who were bullies or
who were bullied. In addition, results from this study found that students who were both
bullies as well as victims fared the worst in regard to life satisfaction, indicating a potential
additive effect of being both of a bully and victim (Flaspohler et al. 2009).
1.1 Aims of the Current Study
Despite the attention electronic bullying has gained in the popular media, little empirical
research on the antecedents and consequences of electronic bullying actually has been
undertaken (Cook et al. 2007). With millions of children using the internet and electronic
devices every day, it becomes apparent that continued research in the area of electronic
aggression and electronic bullying is imperative. To date, researchers have not examined
Electronic Bullying and Life Satisfaction 433
123
associations between electronic bullying and victimization and life satisfaction in ado-
lescents. Furthermore, while only a few studies have specifically examined bullying
behaviors and life satisfaction, the studies relied upon reports of global or overall life satisfaction. Recent findings suggest there may be benefits to using multidimensional
measures to fully assess life satisfaction. For example, in their examination of life satis-
faction among adolescents, Antaramian et al. (2008) found that family structure differences
(i.e., intact vs. non-intact families) were not related to adolescents’ reports of their general
life satisfaction but did relate to their reports of their satisfaction with their family life
suggesting that general life satisfaction reports may mask differences among various
specific life domains.
In an effort to better distinguish among these domains, a multi-faceted measure (i.e.,
Multidimensional Students’ Life Satisfaction Scale: Huebner 1994) and a global measure
of life satisfaction (Students’ Life Satisfaction Scale: Huebner 1991) were employed
together in this study. In this manner, an assessment of adolescents’ global life satisfaction
was obtained along with assessments across five important, specific domains, including
family, friends, school, living environment, and self. This approach was expected to
provide a more comprehensive, contextualized approach relative to previous studies of the
correlates of electronic bullying and victimization.
This exploratory study thus evaluated the relationships among electronic bullying and
victimization and global life satisfaction and satisfaction with specific life domains (e.g.,
family, school) in middle school students. In addition, the current study examined the
frequencies and demographic correlates of electronic bullying and victimization among
middle school students. As such, three major research questions were investigated,
including:
1. What are the frequencies of major forms of electronic bullying and electronic
victimization in a sample of middle school students?
2. What are the relationships among demographic variables (i.e., age, gender, ethnicity,
socio-economic status, self reported grades, and parent status) and electronic bullying
and electronic victimization?
3. What are the relationships among electronic bullying and electronic victimization and
adolescents’ reports of global and domain-specific life satisfaction (i.e., family, school,
friends, living environment, and self)?
2 Method
2.1 Participants
Students in a large middle school (grades 7 and 8) in the Southeastern USA completed
measures of life satisfaction and electronic bullying and electronic victimization as part of
a larger survey of school climate administered and conducted by school personnel. After
accounting for absences and students whose parents refused permission to participate
(n = 11), a total of 910 students were administered survey packets. After eliminating incomplete surveys, a total of 855 (409 boys and 446 girls) students were included in the
analyses. This sample included 443 seventh-grade (214 boys and 229 girls) and 412 eighth-
grade students (195 boys and 217 girls). The mean age of participants was 13
(SD = .76 years). A total of 59% of the participants were Caucasian, 28% were African
American, 3% were Asian American or Pacific Islander, and 2.6% were Hispanic.
434 P. M. Moore et al.
123
Approximately 22% of students reported receiving free or reduced lunch, which was used
as an estimate of socio-economic status (SES). Also, 62.5% of students reported that they
lived with both their biological mother and father, while the remaining 37.5% reported
living with other combinations of adults (i.e., mother and step-father, father and step-
mother, or other adults). Finally, 59.1% of students reported that their parents were mar-
ried, 23.7% reported their parents were divorced, and the remaining 7.2% reported their
parents were separated, never married, or widowed.
2.2 Measures
2.2.1 Electronic Bullying and Victimization
For the purposes of this study, an adaptation of Kowalski and Limber’s (2007) Electronic
Bullying Questionnaire (EBQ) was used. The EBQ is a 23-item self-report measure that
was developed for the purpose of assessing electronic bullying among middle school
students. In the development of the EBQ, Kowalski and Limber (2007) defined electronic
bullying as ‘‘bullying through e-mail, instant messaging, in a chat room, on a website, or
through a text message sent to a cell phone.’’ The EBQ was patterned in part after the
Olweus Bully/Victim Questionnaire (Olweus 1996), a reliable and valid self-report mea-
sure that assesses participants’ experiences with bullying, both as victims and perpetrators
(Olweus 1996; Solberg and Olweus 2003). Similar to the Olweus measure, the EBQ
includes questions about participants’ experiences with bullying (i.e., both being bullied by
and bullying others). Important questions included, ‘‘How often have you been bullied
electronically in the past couple of months?’’ and ‘‘How often have you electronically
bullied someone in the past couple of months?’’
Because of space and time constraints, the original 23-item questionnaire was reduced
to nine core questions that assessed bullying (four questions), victimization (four ques-
tions), and fear of being bullied (one question), eliminating questions concerning how
bullying or victimization occurs (e.g., instant message, text, email). With the exception of
one question aimed at determining how often the participant is afraid of being bullied
electronically, students were asked to respond using the five-point response format from
the Olweus Bully/Victim Questionnaire (i.e., it hasn’t happened in the past couple of
months; only once or twice; two or three times a month; about once a week; several times a
week).
At the time of this study, data on the reliability and validity of the EBQ were not
available. For the current sample, however, coefficient alphas were .83 for the victim-
ization items and .86 for the bullying items, suggesting acceptable internal consistency
reliabilities for the measures. In addition, the mean inter-item correlation value was .41,
with values ranging from .17 to .71, suggesting modest to moderate relationships among
the items.
2.2.2 Multidimensional Students’ Life Satisfaction Scale
Adolescents’ life satisfaction judgments were assessed by the Multidimensional Students’
Life Satisfaction Scale (MSLSS: Huebner 1994). The MSLSS is a 40-item self-report scale
designed for children ages 8–18. Responses are made using a 6-point Likert scale, ranging
from 1 = strongly disagree to 6 = strongly agree. The MSLSS assesses satisfaction across
five important life domains, including family, friends, school, living environment, and self.
Total scores were obtained for each domain by summing the individual items within each
Electronic Bullying and Life Satisfaction 435
123
domain and then dividing by the total number of items within the domain. Support for the
reliability and validity of the MSLSS have been provided in prior studies (e.g., Huebner
1994; Huebner et al. 1998). Alpha coefficients for the domain-based scores have typically
been reported in the .70–.90 range (Gilman et al. 2000; Huebner 1994), with similar test–
retest coefficients for 2- and 4-week periods (Huebner et al. 1998). In addition, convergent
and discriminant validity has been demonstrated through appropriate correlations with
parent reports and other self-report measures (Gilman et al. 2000; Huebner 1994).
2.2.3 Students’ Life Satisfaction Scale
The Students’ Life Satisfaction Scale (SLSS: Huebner 1991) is a 7-item self report scale
designed to assess global life satisfaction in children and adolescents ages 8–18. Like the
MSLSS, students rate each item on a 6 point Likert scale response format from
1 = Strongly Disagree to 6 = Strongly Agree. In addition, two items on the scale are reverse scored. Responses were summed and averaged to obtain a mean global life sat-
isfaction score. The SLSS has consistently demonstrated high reliability and validity.
Internal consistency has been reported to range from .82 to .90, test–retest reliability has
been reported as .76 over a 2-week interval, and inter-item correlations have ranged from
.49 to .73 (Dew and Huebner 1994; Huebner 1991).
2.3 Procedures
During spring 2009, data collection was conducted by the school teachers in their respective
home rooms as part of a school-wide assessment of school climate. Passive consent was
obtained from parents, resulting in 910 students allowed to participate in the study. A total
of 11 students were not allowed to participate. The current study was conducted with
permission from the school district, allowing for use and analysis of their archival data.
Survey packets containing student names and unique identification numbers were dis-
tributed to each homeroom teacher at the middle school. The homeroom teachers dis-
tributed the surveys to their students at the start of the homeroom period as well as read
specific instructions regarding the purpose of the study and the confidentiality of student
responses in order to increase the likelihood of truthful responses. In an effort to control for
possible sequencing effects, a majority of the measures were counterbalanced across
individuals. However, two exceptions to this counterbalancing method were made. Paired
with demographic items, the SLSS was completed first by all students while the EBQ was
completed last. In order to guarantee confidentiality, student identification numbers were
used to ensure confidentiality.
2.4 Data Analysis
Descriptive statistics were calculated. Spearman rho and Pearson correlations were cal-
culated for demographic variables and predictor and criterion variables. The amount of
missing data for the MSLSS, SLSS, and EBQ was small, ranging from .5 to 4.5%. Given
the small amount of missing data, and in order to retain an adequate sample size and
statistical power, mean substitution procedures were used to handle missing data (Buhi
et al. 2008).
Hierarchical regression analyses were subsequently employed to determine the unique
relationships among electronic bullying and victimization and the life satisfaction scores,
436 P. M. Moore et al.
123
after partialling out the effects of demographic variables. Before proceeding to the
regression analyses, normality of criterion variables was assessed by plotting histograms.
Upon inspection, it was observed that friend satisfaction and self satisfaction scores were
not normally distributed and demonstrated excessive skew (-1.98 and -1.55 respectively)
and kurtosis (5.05 and 3.15 respectively). Despite violation of the normality assumptions,
parametric tests were utilized for several reasons. The effect of the violation of the nor-
mality assumption on significance tests depends on the sample size, with problems
occurring in smaller samples (Cohen et al. 2003). With larger sample sizes, such as the
current study, non-normality does not lead to serious problems with significance tests. In
addition, both square root and log transformations were conducted, neither of which
changed the shape of the distributions. The remaining criterion variables appeared
approximately normal and exhibited skew and kurtosis levels within acceptable limits
(between -1.0 and 1.0).
3 Results
Frequencies, means and standard deviations for life satisfaction, electronic victimization,
and electronic bullying are summarized in Tables 1, 2 and 3. When asked about bullying
and victimization in the past few months, 86% of participants reported that they did not
partake in any form of electronic bullying while 80% reported they were not victims.
Overall, participants self-reported moderate levels of global life satisfaction as measured
by the SLSS (M = 4.55, SD = 1.06). The MSLSS domain scores indicated that partici- pants were most satisfied with their friends (M = 5.31, SD = .87) and least satisfied with school (M = 4.37, SD = 1.27).
Electronic bullying was found to be significantly correlated with gender (r = .13, p \ .001), parent marital status (r = .10, p \ .005), and self-reported grades in school (r = -.18, p \ .001). Electronic victimization was significantly correlated with ethnicity (r = .08, p \ .05), grade (r = -.07, p \ .05), SES (r = .07, p \ .05), parent status (r = .09, p \ .01, and self-reported grades in school (r = -.23, p \ .001). Global life satisfaction (i.e., SLSS scores) was significantly correlated with parent custody (r = -.15 p \ .001), parent status (r = -.20, p \ .001) and self-reported grades in school (r = .29, p \ .001). Family satisfaction was correlated with parent custody (r = -.09, p \ .01), parent status (r = -.15, p \ .001) and self-reported grades in school (r = .20, p \ .001). Friend satisfaction was correlated with gender (r = .16, p \ .001), parent status (r = -.07, p \ .05) and self-reported grades in school (r = .11, p \ .05). Living satisfaction
Table 1 Descriptive statistics for measures
Scoring of SLSS: 1 = Strongly Disagree to 6 = Strongly Agree; Scoring of MSLSS: 1 = Strongly Disagree to 6 = Strongly Agree
Variable M SD
SLSS 4.55 1.06
Family satisfaction 4.76 1.20
Friend satisfaction 5.31 .87
Living satisfaction 4.80 1.19
Self satisfaction 5.14 .86
School satisfaction 4.37 1.27
Electronic bullying 1.36 .69
Electronic victimization 1.18 .49
Electronic Bullying and Life Satisfaction 437
123
T a
b le
2 F
re q u e n c ie
s o f
e le
c tr
o n ic
b u ll
y in
g a n d
v ic
ti m
iz a ti
o n
E B
Q e le
c tr
o n ic
v ic
ti m
iz a ti
o n
q u e st
io n s
H a v e n ’t
O n c e
o r
tw ic
e 2 – 3
a m
o n th
O n c e
a w
e e k
S e v e ra
l ti
m e s
H o
w o ft
e n
h a v e
y o u
e le
c tr
o n ic
a ll
y b u ll
ie d
so m
e o n e
in th
e p a st
c o u p le
o f
m o n th
s? 6 8 0
1 1 3
2 0
1 8
2 3
H a v
e y
o u
m a d
e fu
n o
f so
m e o
n e
o r
te a se
d so
m e o
n e
e ls
e in
a h
u rt
fu l
w a y
… ?
6 7
5 1
1 4
3 7
9 2
2
H a v
e y
o u
to ld
li e s
o r
sp re
a d
ru m
o rs
a b o
u t
so m
e o
n e
e ls
e …
? 5
6 6
1 8
0 5
4 1
8 3
9
H a v
e y
o u
u se
d so
m e o
n e
e ls
e ’s
c o
m p
u te
r u
se rn
a m
e o
r sc
re e n
-n a m
e to
sp re
a d
ru m
o rs
o r
li e s
a b
o u
t a n
o th
e r
p e rs
o n
? 7
7 9
4 3
1 5
5 1
5
E B
Q e le
c tr
o n ic
b u ll
y in
g q u e st
io n s
H a sn
’t O
n c e
o r
tw ic
e 2 – 3
a m
o n th
O n c e
a w
e e k
S e v e ra
l ti
m e s
H o
w o ft
e n
h a v e
y o u
b e e n
b u ll
ie d
e le
c tr
o n ic
a ll
y in
th e
p a st
c o u p le
o f
m o n th
s? 7 3 6
8 7
1 6
6 1
2
H a s
a n
y o
n e
m a d e
fu n
o f
y o
u o
r te
a se
d y
o u
in a
h u
rt fu
l w
a y …
? 6
9 3
1 2
0 2
9 4
1 0
H a s
a n
y o
n e
to ld
li e s
o r
sp re
a d
ru m
o rs
a b
o u
t y
o u …
? 7
5 9
7 2
1 4
3 9
H a s
a n y o n e
u se
d y o u r
c o m
p u te
r u se
rn a m
e o
r sc
re e n -n
a m
e to
sp re
a d
ru m
o rs
o r
li e s
a b
o u
t a n
o th
e r
p e rs
o n
? 8
1 3
2 4
9 2
8
438 P. M. Moore et al.
123
was correlated with grade (r = -.08, p \ .01), age (r = -.09, p \ .05), parent status (r = -.11, p \ .01), and self-reported grades in school (r = .16, p \ .001). Self satis- faction was correlated with race (r = .24, p \ .001) and self -reported grades in school (r = .13, p \ .001). Finally, school satisfaction was correlated with gender (r = .09, p \ .01), SES (r = .22, p \ .001), and self- reported grades in school (r = .13, p \ .001).
Zero-order correlations among the major variables are presented in Tables 4 and 5.
There were modest, negative correlations between electronic bullying and the global life
satisfaction (r = -.22), and all of the domain-based measures of life satisfaction (ranging from r = -.15 to -.22). There were also modest, negative correlations between victim- ization and global life satisfaction (r = -.11) and all of the domain-based measures of life satisfaction (ranging from r = -.13 to -.18).
Table 3 Descriptive statistics for electronic bullying and victimization
N M SD
Electronic victimization
How often have you electronically bullied someone in the past couple of months? 857 1.22 .65
Have you made fun of someone or teased someone else in a hurtful way…? 856 1.27 .66 Have you told lies or spread rumors about someone else …? 857 1.17 .57 Have you used someone else’s computer username or screen-name to spread rumors or
lies about another person? 856 1.09 .48
Electronic Bullying
How often have you been bullied electronically in the past couple of months? 854 1.35 .85
Has anyone made fun of you or teased you in a hurtful way…? 857 1.35 .83 Has anyone told lies or spread rumors about you…? 857 1.58 1.02 Has anyone used your computer username or screen-name to spread rumors or lies
about another person? 857 1.17 .65
Response options for the EBQ are as follows: 1 = Hasn’t happened; 2 = Once or twice; 3 = 2 or 3 times a month; 4 = Once a week; 5 = Several times a week
Table 4 Correlations among demographic variables, bullying, victimization, and life satisfaction
Bully Victim SLSS Family Friend Living Self School
Grade -.04 -.07* .03 .002 .06 -.08* .01 -.03
Sex .13** .02 -.05 -.02 .16** -.03 .01 .09*
Race -.07 .08* -.02 .04 .02 .05 .24** .22**
SES .06 .07* -.05 -.06 -.05 -.06 .22** .05
Age .04 -.03 -.04 -.05 -.02 -.09** -.004 -.02
Custody .04 .05 -.152** -.093** -.034 -.06 .001 .02
Status .10** .09** -.20** -.15** -.07* -.11** -.04 -.03
Grades -.18** -.23** .29** .20** .11** .16** .13** .13**
Race is coded 1 = Minority Race/Ethnicity and 0 = Caucasian. Sex is coded 0 = Male and 1 = Female. SES is coded 0 = regular lunch and 1 = free or reduced rate lunch. Custody = Parent Custody. Status = Parent Status. Grades = Self reported grades
* p \ .05; ** p \ .01
Electronic Bullying and Life Satisfaction 439
123
Independent-samples t tests were also conducted in order to compare electronic bullying and victimization scores across gender, ethnicity, socioeconomic status, parent custody and
parent marital status (Table 6). Significant differences were found regarding electronic
bullying for gender (males M = 1.28, SD = .61; females M = 1.43, SD = .74; t (849) = -3.26, p \ .01, d = -.22), parent marital status (biological parents married M = 1.32, SD = .66; other marital status M = 1.42, SD = .72; t (842) = -2.15, p \ .01, d = -.14), and parent custody (live with both biological parents M = 1.32, SD = .65; live with other combination of adults M = 1.43, SD = .43; t (849) = -2.21, p \ .05, d = -.20). Significant differences were found regarding electronic victimization for gender
(males M = 1.22, SD = .61; females M = 1.15, SD = .35; t (849) = 1.97, p \ .05, d = -.60), ethnicity (Caucasian M = 1.16, SD = .41; African-American M = 1.24, SD = .58; t (743) = 2.02, p \ .05, d = .17), parent marital status (biological parents married M = 1.14, SD = .40; other marital status M = 1.24, SD = .60; t (843) = -2.96, p \ .01, d = -.20), and parent custody (live with both biological parents M = 1.15, SD = .43; live with other combination of adults M = 1.24, SD = .58; t (850) = -2.45, p \ .01, d = -.18).
Hierarchical multiple regression analyses were used to assess the relationship between
electronic bullying and victimization and life satisfaction, as measured by the MSLSS
domain-based scores and SLSS global score, after controlling for significant demographic
variables. In all, twelve regression analyses were run with electronic bullying and vic-
timization as predictor variables and global and domain-based life satisfaction measure as
criterion variables. After controlling for demographic variables in Step 1 of each of the
analyses, the electronic bullying or victimization scores were entered in Step 2 in order to
determine their unique effects on the criterion variables. The regression models are pre-
sented in Tables 7 and 8. Overall, after controlling for demographic relationships, elec-
tronic bullying related significantly to global life satisfaction (beta = -.14, p \ .001; DR2 = .02), family satisfaction (beta = -.17, p \ .001; DR2 = .03), friend satisfaction (beta = -.19, p \ .001; DR2 = .03), living satisfaction (beta = -.16, p \ .001; DR2 = .02), self satisfaction (beta = -.18, p \ .001; DR2 = .03), and school satisfaction (beta = -.14, p \ .001; DR2 = .02). Also, electronic victimization, related significantly to family satisfaction (beta = -.11, p \ .001; DR2 = .01), friend satisfaction (beta = -.10, p \ .005; DR2 = .01), living satisfaction (beta = -.11, p \ .005; DR2 = .01), self satis- faction (beta = -.17, p \ .001; DR2 = .03), and school satisfaction (beta = -.14, p \ .001; DR2 = .02).
Table 5 Correlations among life satisfaction, bullying, and victimization
Global Family Friend Living Self School Bully Victim
Global –
Family .60* –
Friend .40* .40* –
Living .53* .66* .53* –
Self .47* .55* .67* .56* –
School .43* .58* .46* .51* .58* –
Bully -.22* -.22* -.19* -.19* -.21* -.15* –
Victim -.11* -.15* -.13* -.14* -.18* -.16* .41* –
* p \ .01
440 P. M. Moore et al.
123
4 Discussion
This study explored experiences of electronic bullying and victimization among middle
school students in a suburban USA school. A total of 14% of the students reported
engaging in electronic bullying behaviors, while 20% reported being victims of electronic
bullying. Of more concern is the fact that of those students who reported victimization and
Table 6 Results of T tests and descriptive statistics
Group 95% CI for mean difference t df d
Male Female
M SD n M SD n
Victim 1.22 .61 407 1.15 .35 444 .000–.132 1.97* 849 -.03
Bully 1.28 .61 408 1.43 .74 443 -.001–.134 -3.25** 849 -.22
Caucasian Minority 95% CI for mean difference t df d
M SD n M SD n
Victim 1.16 .415 505 1.24 .578 240 .011–.157 2.27* 743 .17
Bully 1.37 .680 505 1.31 .626 239 -.161–.043 -1.13 742 -.09
7th Grade 8th Grade 95% CI for mean difference t df d
M SD n M SD n
Victim 1.21 .54 441 1.15 .44 410 .000–.127 1.80 849 .12
Bully 1.39 .72 441 1.33 .65 410 -.034–.149 1.23 849 .08
FRL No FRL 95% CI for mean difference t df d
M SD n M SD n
Victim 1.23 .61 184 1.17 .46 656 -.151–.010 -1.72 838 -.13
Bully 1.39 .64 183 1.35 .70 656 -.148–.072 -.623 837 -.05
Custody both Custody other 95% CI for mean difference t df d
M SD n M SD n
Victim 1.15 .43 533 1.24 .58 319 -.154–.017 -2.45** 850 -.18
Bully 1.32 .65 532 1.43 .43 319 -.203–.012 -2.21* 849 -.20
Bio married Other status 95% CI for mean difference t df d
M SD n M SD n
Victim 1.14 .40 500 1.24 .60 345 -.174–.029 -2.96** 843 -.20
Bully 1.32 .66 498 1.42 .72 346 -.198–.009 -2.15* 842 -.14
Race is coded 1 = Minority Race/Ethnicity and 0 = Caucasian. Sex is coded 0 = Male and 1 = Female. SES is coded 0 = regular lunch and 1 = free or reduced rate lunch. Custody is coded as 0 = live with both biological parents and 1 = other combination of adults. Status is coded as 0 = Married and 1 = Other status
* p \ .05; ** p \ .01
Electronic Bullying and Life Satisfaction 441
123
Table 7 Summary of regression analyses with predictor variable electronic bullying
B SEB b DR2 DF
Family satisfaction
Demographics .23 .04 .19 .07 8.16*
Demographics & victimization -.31 .06 -.17 .03 25.03*
Friend satisfaction
Demographics .06 .03 .07 .04 5.27*
Demographics & victimization -.24 .04 -.19 .03 30.00*
Living satisfaction
Demographics .18 .04 .14 .05 6.33*
Demographics & victimization -.27 .06 -.15 .02 19.43*
Self satisfaction
Demographics .12 .03 .14 .06 7.48*
Demographics & victimization -.23 .04 -.18 .03 26.70*
School Satisfaction
Demographics .17 .05 .13 .07 9.07*
Demographics & victimization -.26 .06 -.14 .02 15.84*
Global life satisfaction (SLSS)
Demographics .28 .04 .26 .13 16.19*
Demographics & victimization -.22 .05 -.144 .02 17.51*
* p \ .01
Table 8 Summary of regression analyses with predictor variable electronic victimization
B SEB b DR2 DF
Family satisfaction
Demographics .23 .04 .18 .07 8.14*
Demographics & victimization -.28 .09 -.11 .01 10.52*
Friend satisfaction
Demographics .06 .03 .07 .04 5.25*
Demographics & victimization -.18 .06 -.10 .01 8.11*
Living satisfaction
Demographics .18 .04 .14 .05 6.32*
Demographics & victimization -.27 .09 -.11 .01 9.53*
Self satisfaction
Demographics .12 .03 .14 .06 7.52*
Demographics & victimization -.30 .06 -.17 .03 22.95*
School satisfaction
Demographics .17 .05 .13 .07 9.13*
Demographics & victimization -.37 .09 -.14 .02 16.19*
Global life satisfaction (SLSS)
Demographics .28 .04 .26 .13 16.21*
Demographics & victimization -.08 .07 -.04 .001 1.17
* p \ .01
442 P. M. Moore et al.
123
bullying, 3% of students reported being victims of electronic bullying several times a week
while 1.4% reported engaging in electronic bullying several times a week, indicating that a
small portion of students engage in or suffer from chronic forms of electronic bullying.
Electronic bullying displayed statistically significant associations with student gender,
parent marital status, and self-reported grades in school. Electronic victimization showed
statistically significant associations with student ethnicity, grade level, SES, parent marital
status, and self-reported grades in school. Furthermore, students who did not live with both
biological parents were more likely to be both victims and perpetrators of electronic
bullying compared to students living with both biological parents. Similarly, students
whose biological parents were not married were more likely to be both victims and per-
petrators as compared to students whose biological parents were married. These differ-
ences suggest that both bullies and victims may be more likely to come from non-intact
family situations as compared to their peers.
Student gender also related significantly to experiences of electronic bullying and vic-
timization. In this sample, female students were more likely to engage in electronic bul-
lying, and females and minority students were more likely to be victims. These results were
not necessarily expected as previous studies have suggested that females are more likely to
be victims of electronic bullying whereas males are more likely to be aggressors (Kowalski
and Limber 2007; Wang et al. 2009). However, girls outnumbered boys (446–409) in this
sample, possibly accounting for the differences among studies. It may also be important to
consider that in regard to traditional bullying, girls tend to utilize relational aggressive acts
more than boys (Crick and Bigbee 1998; Crick and Grotpeter 1995; French et al. 2002).
Similarly, contrary to the findings of this study, previous research has suggested that
minority students are more often involved in electronic bullying behaviors as aggressors
rather than as victims (Wang et al. 2009). Thus, although generalizable demographic dif-
ferences may emerge as more research findings appear in the literature, it does appear safe to
conclude that individuals can be subjected to and engage in electronic bullying regardless of
age, gender, ethnicity, academic performance, and SES (Aricak et al. 2008).
The differences in the findings of studies of the experiences of early adolescents with
electronic bullying and victimization merit further consideration. The differences may be
due to various issues related to the novelty of the research area. These issues include
differences across studies in terms of the definitions of bullying and victimization, samples,
and measures. For example, little information is available regarding the psychometric
properties of the existing measures of electronic bullying and victimization. Because of the
unknown validity of the measures, students who have may been exposed to electronic
bullying may not recognize it as such due to how and what is being asked of them. These
students may not recognize that what they have experienced is, in fact, a form of bullying
(Aricak et al. 2008; Kowalski and Limber 2007). For another example, differences in the
age levels of student samples are likely important. As children progress through school,
their access to and use of electronic technologies and social networking cites is likely to
increase, which may in turn result in an increase in electronic bullying (Kowalski and
Limber 2007). Finally, differences in the modalities associated with electronic bullying are
likely critical to understand. Although the original questionnaire used in this research study
asked about bullying modalities (i.e., cell phone, emails, social network sites), these
questions had to be removed because of space and time limitations. Variation may occur
due to differences in access and therefore exposure to the type of bullying that occurs. For
example, many schools and public libraries in the USA now have computers available to
students, which may account for an increase in electronic bullying due to computer use as
compared to more personal, costly devices such as cell phones.
Electronic Bullying and Life Satisfaction 443
123
This study also investigated the relationship between electronic bullying and victim-
ization and adolescents’ reports of global and domain-specific life satisfaction (family,
school, friends, self, and living environment). The findings revealed modest, negative
correlations between electronic bullying and victimization and global life satisfaction and
satisfaction with family, friends, living environment, self, and school. Thus, the presumed
effects of electronic bullying and victimization although modest, appear quite pervasive,
occurring across multiple important life domains.
In general, these results are consistent with traditional bullying and life satisfaction
research, which indicates that students who report being bullies and victims of traditional
bullying have lower levels of life satisfaction compared to their peers (Flaspohler et al.
2009). Specifically, research examining on-line harassment suggests that those with lower
levels of self-esteem are more likely to respond maladaptively compared to their non -
victimized peers (Hinduja and Patchin 2007b). Similarly, research has found that both
overt victimization and relational victimization experiences correlate with reduced levels
of life satisfaction (Martin and Huebner 2007). In contrast, students who report higher
levels of life satisfaction tend to report better interpersonal, intrapersonal, and academic
outcomes. Youth who report higher levels of life satisfaction also report higher levels of
personal control, self-esteem, extraversion, hope, self-efficacy, and interpersonal skills.
These youth also report higher school grades, better peer relationships, and more positive
school experiences (Gilman and Huebner 2006; Suldo and Huebner 2006).
After controlling for significant demographic relationships, the results of the hierar-
chical multiple regression analyses, controlling for significant demographic relationships,
revealed comparable findings to those based on the zero-order correlations, with one
exception. With demographic variables were controlled, the relationship between elec-
tronic victimization and global life satisfaction became non-significant whereas relation-
ships with the domain-based measures remained significant. This finding suggests the
possibility that global measures of life satisfaction may mask important relationships on
occasion. The finding of the non-significant relationship with overall life satisfaction is
consistent with the previously mentioned study by Antaramian et al. (2008), in which
differences in family structure (i.e., intact vs. non-intact) related significantly to satisfac-
tion with family life, but not with overall life satisfaction. Thus, further research is needed
to determine the relative sensitivity of global and domain-based life satisfaction measures
in various contexts. Future research should also explore whether or not the modest rela-
tionships with the various life satisfaction reports generalize across different samples of
adolescents or whether there are potential moderators of the relationships (e.g., differences
in social support), such that some students experience more detrimental consequences that
others from this new form of bullying. For example, Flaspohler et al. (2009) found that the
relationships between victimization and life satisfaction were stronger for students with
low social support from peers and teachers.
Overall, this study has several major limitations. First, data were obtained from students
from a Southeastern USA middle school with characteristics that were not representative of
the USA as whole, which may limit the generalizability of the findings. More research is
needed in order to investigate the relationship between electronic bullying and life satis-
faction with more representative samples of students as well as with students from other
age ranges. Another limitation of this study was the cross-sectional design, which cannot
shed light on the directionality of the relationships between electronic bullying and life
satisfaction. Longitudinal analyses are needed to clarify the directionality of the rela-
tionships, including the possibility of bidirectional relationships.
444 P. M. Moore et al.
123
The findings of this exploratory research study have important implications for not only
youth engaging in and victimized by electronic bullying, but also for parents and human
services professionals alike. As previously discussed, bullying from peers has been iden-
tified as one of the most problematic behavioral concerns among adolescents (Boulton
1999; Boulton et al. 2008; Hawker and Boulton 2000). With the high prevalence rates of
electronic bullying and victimization, such experiences have become a global phenome-
non, meriting considerable concern (Aricak et al. 2008; Kowalski and Limber 2007;
Willard 2006). Given that a majority of students report that electronic bullying is most
likely to start at school and continue at home, it is important for parents and school and
community professionals to take such behavior seriously and educate themselves about its
nature, frequency, and correlates (Cassidy et al. 2009; Kowalski et al. 2008). Furthermore,
it is critical that preventative and palliative strategies are developed to address concerns
related to electronic bullying and victimization. The available evidence suggests that
electronic bullying and victimization are related to lower subjective well-being, in the form
of reduced life satisfaction, for both parties. As technology continues to progress, it is
likely that adolescents’ use of electronic communication technologies will increase,
therefore, continued research is critical to understand this new form of bullying and its
consequences.
References
Antaramian, S., Huebner, E. S., & Valois, R. (2008). Adolescent life satisfaction. Applied Psychology: An International Review, 57, 112–126.
Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., et al. (2008). Cyberbullying among Turkish adolescents. CyberPsychology and Behavior, 11, 253–261.
Batsche, G., & Knoff, H. (1994). Bullies and their victims: Understanding a pervasive problem in the schools. School Psychology Review, 23, 165–174.
Beran, T., & Li, Q. (2005). Cyber-harassment: A new method for an old behavior. Journal of Educational Computing Research, 41, 137–153.
Berson, I., & Berson, M. (2005). Challenging online behaviors of youth. Social Science Computer Review, 23, 29–38.
Boulton, M. (1999). Concurrent and longitudinal relations between children’s playground behavior and social preference, victimization, and bullying. Child Development, 70, 944–954.
Boulton, M., Trueman, M., & Murray, L. (2008). Associations between peer victimization, fear of future victimization and disrupted concentration on class work among junior school pupils. British Journal of Education and Psychology, 78, 473–489.
Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educa- tional Administration and Policy, 57(1), 1–36.
Buhi, E. R., Goodson, P., & Neilands, T. B. (2008). Out of sight, not out of mind: Strategies of handling missing data. American Journal of Health Behavior, 32, 83–92.
Cassidy, W., Jackson, M., & Brown, K. (2009). Sticks and stones can break my bones, but how can pixels hurt me?: Students’ experiences with cyber-bullying. School Psychology International, 30, 383–402.
Cohen, J., Cohen, P., West, S. G., & Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioral sciences (3rd ed.). Mahwah, NJ: Erlbaum.
Cook, C. R., Williams, K. R., Guerra, N. G., & Tuthill L. (2007). Cyberbullying: What it is and what we can do about it? NASP Communiqué, 36(1), 4–5.
Crick, N., & Bigbee, M. (1998). Relational and overt forms of peer victimization: A multi informant approach. Journal of Consulting and Clinical Psychology, 66, 337–347.
Crick, N. R., & Grotpeter, J. K. (1995). Relational aggression, gender, and social-psychological adjustment. Child Development, 66, 710–722.
David-Ferdon, C., & Hertz, M. (2007). Electronic media, violence, and adolescents: An emerging public health problem. Journal of Adolescent Health, 41, S1–S5.
Electronic Bullying and Life Satisfaction 445
123
DeBell, M., & Chapman, C. (2003). Computer and internet use by children and adolescents in the United States, 2001 (NCES 2004–014). U.S. Department of Education. Washington, DC: National Center for Education Statistics.
Dew, T., & Huebner, E. S. (1994). Adolescents’ perceived quality of life: An exploratory investigation. Journal of School Psychology, 32, 185–199.
Diener, E. (1984). Subjective well-being. Psychological Bulletin, 95, 542–575. Fight Crime: Invest in Kids. (2006). One of three teens and one of six preteens are victims of cyber bullying
[Data file]. Retrieved from http://www.fightcrime.org/state/pennsylvania/news/1-3-teens-1-6-preteens- are-victims-cyber-bullying.
Flaspohler, P. D., Elfstrom, J. L., Vanderzee, K. L., Sink, H. E., & Birchmeier, Z. (2009). Stand by me: The effects of peer and teacher support in mitigating the impact of bullying on quality of life. Psychology in the Schools, 46, 636–649.
French, D., Jansen, E., & Pidada, S. (2002). United States and Indonesian children’s and adolescents’ reports of relational aggression by disliked peers. Child Development, 73, 1143–1150.
Gilman, R., & Huebner, E. S. (2006). Characteristics of adolescents who report very high life satisfaction. Journal of Youth and Adolescence, 35, 311–319.
Gilman, R., Huebner, E. S., & Laughlin, J. (2000). A first study of the multidimensional students’ life satisfaction scale with adolescents. Social Indicators Research, 52, 135–160.
Hawker, D., & Boulton, M. (2000). Twenty years’ research on peer victimization and psychosocial mal- adjustment: A meta-analytic review of cross-sectional studies. Journal of Child Psychology and Psychiatry, 41, 441–455.
Hinduja, S., & Patchin, J. (2007a). Cyberbullying victim and offender warning signs. Cyberbullying Research Center. Retrieved from http://www.cyberbullying.us/cyberbullyingwarningsigns.pdf.
Hinduja, S., & Patchin, J. (2007b). Cyberbullying victimization and self-esteem. In Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott Marquis, Atlanta, Georgia. 2010-06-07 from http://www.allacademic.com/meta/p201344_index.html.
Hinduja, S., & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 129–156.
Huebner, E. S. (1991). Initial development of the students’ life satisfaction scale. School Psychology International, 12, 231–240.
Huebner, E. S. (1994). Preliminary development and validation of a multidimensional life satisfaction scale for children. Psychological Assessment, 6, 149–158.
Huebner, E. S., Laughlin, J., Ash, C., & Gilman, R. (1998). Further validation of the multidimensional students’ life satisfaction scale. Journal of Psychoeducational Assessment, 16, 118–134.
Juvonen, J., Graham, S., & Schuster, M. (2003). Bullying among young adolescents: The strong, the weak, and the troubled. Pediatrics, 112, 1231–1237.
Juvonen, J., & Gross, E. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78, 496–505.
Kowalski, R., & Limber, S. (2007). Electronic bullying among middle school students. Journal of Ado- lescent Health, 41, S22–S30.
Kowalski, R., Limber, S., & Agaston, P. (2008). Cyber bullying: Bullying in the digital age. Victoria: Blackwell Publishing.
Lenhart, A., Madden, M., & Hitlin, P. (2005). Teens and technology: Youth are leading the transition to a fully wired and mobile nation. Pew Internet and American Life Project. Retrieved from http://pweinternet.org/pdfs/PIP_teens_Tech_July2005.web.pdf.
Martin, K., & Huebner, S. (2007). Peer victimization and prosocial experiences and emotional well-being of middle school students. Psychology in the Schools, 44, 199–208.
Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among US youth: Prevalence and association with psychosocial adjustment. Journal of the American Medical Association, 285, 2094–2100.
Olweus, D. (1993). Bullying at school: What we know and what we can do. Cambridge, MA: Blackwell. Olweus, D. (1994). Bullying at school: Basic facts and effects of a school based intervention program.
Journal of Child Psychology and Psychiatry, 35, 1171–1190. Olweus, D. (1996). The revised Olweus bully/victim questionnaire. Norway: University of Bergen. Patchin, J., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying.
Youth Violence and Juvenile Justice, 4, 148–169. Raskauskas, J., & Stoltz, A. (2007). Involvement in traditional and electronic bullying among adolescents.
Developmental Psychology, 43, 564–575. Solberg, M., & Olweus, D. (2003). Prevalence estimation of school bullying with the Olweus bully/victim
questionnaire. Aggressive Behavior, 29, 239–268.
446 P. M. Moore et al.
123
Suldo, S. M., & Huebner, E. S. (2006). Is extremely high life satisfaction during adolescence advantageous? Social Indicators Research, 78, 179–203.
Vossekuil, B., Fein, R., Reddy, M., Borum, R., & Modzelesku, W. (2002). The final report and findings of the safe school initiative: Implications for the preventions of school attacks in the United States. Washington, DC: U.S. Secret Service and U.S. Department of Education.
Wang, J., Iannotti, R., & Nansel, T. (2009). School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45, 368–375.
Willard, N. (2003). Off-campus, harmful online student speech. Journal of School Violence, 1, 65–93. Willard, N. (2006). Flame retardant. School Library Journal, 52, 55–56. Williams, K., & Guerra, N. (2007). Prevalence and predictors of internet bullying. Journal of Adolescent
Health, 41, S14–S21. Willkins-Shurmer, A., O’Callaghan, M., Najman, J., Bor, W., Williams, G., & Anderson, M. (2003).
Association of bullying with adolescent health-related quality of life. Journal of Pediatric Child Health, 39, 436–441.
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online only contacts. Journal of Adolescent Health, 41, S51– S58.
Ybarra, M., Espelage, D., & Mitchell, K. (2007a). The co-occurrence of online verbal aggression and sexual solicitation victimization and perpetration: Association with psychosocial indicators. Journal of Adolescent Health, 41, S31–S41.
Ybarra, M., & Mitchell, K. (2004a). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308–1316.
Ybarra, M., & Mitchell, K. (2004b). Youth engaging in online harassment: associations with caregiver-child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27, 319–336.
Ybarra, M., West, M., & Leaf, P. (2007b). Examining the overlap in internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health, 41, S42–S50.
Electronic Bullying and Life Satisfaction 447
123
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
- c.11205_2011_Article_9856.pdf
- Electronic Bullying and Victimization and Life Satisfaction in Middle School Students
- Abstract
- Introduction
- Aims of the Current Study
- Method
- Participants
- Measures
- Electronic Bullying and Victimization
- Multidimensional Students’ Life Satisfaction Scale
- Students’ Life Satisfaction Scale
- Procedures
- Data Analysis
- Results
- Discussion
- References
ORIGINAL ARTICLES
Cyberbullying: The Challenge to Define
Colette Langos, B.A., L.L.B., GDLP, MComL
Abstract
Cyberbullying is a reality of the digital age. To address this phenomenon, it becomes imperative to understand exactly what cyberbullying is. Thus, establishing a workable and theoretically sound definition is essential. This article contributes to the existing literature in relation to the definition of cyberbullying. The specific elements of repetition, power imbalance, intention, and aggression, regarded as essential criteria of traditional face-to-face bullying, are considered in the cyber context. It is posited that the core bullying elements retain their importance and applicability in relation to cyberbullying. The element of repetition is in need of redefining, given the public nature of material in the online environment. In this article, a clear distinction between direct and indirect cyberbullying is made and a model definition of cyberbullying is offered. Overall, the analysis provided lends insight into how the essential bullying elements have evolved and should apply in our parallel cyber universe.
Introduction
What has become overwhelmingly apparent over thelast decade is just how extensively new information and communication technologies (ICTs) have become inter- twined with our everyday lives. The benefits of new tech- nology are undeniable, but along with the advantages comes the potential for technology to be misused. Cyberbullying is one of the negative by-products of the digital age.
Cyberbullying has proven difficult to define. To date, a universal definition has not been agreed upon. A literal ap- proach to interpreting the meaning may be to consider the words ‘‘cyber’’ and ‘‘bullying’’ quite separately, attaching ordinary, natural meaning to the words and then merging the two meanings to create a singular meaning.
Following this approach, ‘‘cyber’’ may be quite simply described as ‘‘generated by technology.’’ Defining ‘‘bullying’’ presents a more challenging task.1,2 Semantic differences may explain the varying conceptualizations of bullying,1 consid- ering linguistic differences that exist across disciplines and cultures. In general, national and international consensus exists3 that bullying is a subset of aggression defined as be- ing a ‘‘specific type of aggressive behaviour that is intended to cause harm, through repeated actions carried out over time, targeted at an individual who is not in a position to defend him/herself.’’4 It can be physical or nonphysical in form.5
The elements of repetition (a course of conduct as op- posed to a single incident); power imbalance (where the offender demonstrates power over the target); intention (conduct must be intended as opposed to accidental); and
aggression (conduct involves maliciousness on the part of the aggressor) are broadly considered as being the necessary elements differentiating bullying from mere aggression. A distinction can be made between direct and indirect tradi- tional bullying. Direct bullying may include physical bul- lying (e.g., hitting and kicking), damaging the personal property of a victim, or verbally bullying the victims (e.g., name calling). Indirect bullying in the traditional sense may include behaviors such as spreading false rumors about the victim behind their back.
The four core bullying elements are encapsulated within several descriptive cyberbullying definitions.6,7 The element unique to a cyberbullying definition relates to use of ICTs through which repeated, aggressive online acts are facilitated. Cyberbullying can occur through a variety of technological media, such as computers, mobile phones (smart phones), or any other ICTs. Cyberbullying is bullying transposed on a technological platform.
Traditional Bullying Elements in the Cyber Context
There is some academic debate as to the importance of the four foundation elements of traditional bullying in the cyber context. This being the case, the ordinary meanings of repe- tition, power imbalance, intention, and aggression will need revising/redefining to tailor their meanings to the cyber en- vironment if society is to develop a satisfactory response to the phenomenon.
To assist in understanding how the elements may apply in the cyber context, it is necessary to differentiate between di- rect and indirect cyberbullying.
Centre for Regulation and Market Analysis, and School of Law, University of South Australia, Adelaide, South Australia, Australia.
CYBERPSYCHOLOGY, BEHAVIOR, AND SOCIAL NETWORKING Volume 15, Number 6, 2012 ª Mary Ann Liebert, Inc. DOI: 10.1089/cyber.2011.0588
285
Direct cyberbullying occurs where the cyberbully ‘‘directs the electronic communications directly at the victim. It en- compasses a cyberbully’s use of instant messaging, text or multimedia messaging, or email intended to have a direct, immediate effect on the victim.’’8 Direct cyberbullying is limited to the context where the cyberbully directs commu- nications to the victim only, as opposed to communications that are posted to more public areas of cyberspace. Direct cyberbullying occurs in the private domain.
Indirect cyberbullying occurs where the cyberbully ‘‘does not direct the electronic communication that constitutes the bullying at his/her victim directly. Instead, the bully posts them on MySpace, Facebook, a specially created Website or blog, or some other reasonably public area of cyberspace.’’8
Public forums such as social media sites, blogs, Web pages, and video-sharing Web sites are obvious examples of plat- forms that fall within the public cyberspace arena. The con- cept of the public domain in cyberspace extends to situations where the victim has knowledge of multiple recipients being privy to a personal communication transmitted via ICTs. The nature of this technology is such that the sender has no con- trol over to whom the original communication is forwarded. Because multiple parties are directly privy to the original electronic communication, the communication has the po- tential to spread to an infinite audience. Thus, once any other recipient has access to the information, it should be consid- ered material falling within the public arena.
Repetition
Repetition is firmly established as being a key criterion in cyberbullying.9,10 Without the presence of this element, con- duct may arguably be described as mere face-to-face joking or jovial teasing in the traditional sense, or cyberjoking or playful cyberteasing in the virtual world. Teasing is specifically re- ferred to as playful or jovial in nature. Olweus comments that some forms of ‘‘repeated teasing of a degrading and offensive character continued in spite of clear signs of distress or op- position on the part of the target qualifies as bullying.’’11 Re- petition is an important criterion to allow for differentiation between a joke or jovial teasing and an intentional attack.12
The presence of repetition demonstrates systematic conduct. The nature of cyberspace alters the way in which repetition
should be understood in some instances. One act in cyber- space, such as one posting of a photo or video, one posting on a blog, on a Web site, one e-mail sent, one twitter tweeted, or one SMS sent, has the unique ability to remain in cyberspace indefinitely, as photos, videos, e-mails, tweets, and phone messages can be archived or forwarded by anyone who gains access. A single act could be considered repetitive each time the blog, Web site, video, e-mail, photo, or text message is accessed/viewed.13 In the cyber context, it is necessary to consider the element of repetition differentiating between direct and indirect cyberbullying.
Direct cyberbullying occurs in the private arena. It involves electronic communications directed from the perpetrator to the victim only. Direct cyberbullying could include, but is in no way limited to, calls from the perpetrator’s mobile phone to the victim’s mobile phone, SMS messaging between the perpetrator’s mobile phone and the victim’s mobile phone, or e-mails sent to a victim’s personal e-mail account from the perpetrator’s personal e-mail account. In the direct cyber-
bullying context, for conduct to qualify as cyberbullying, the victim would need to be subjected to a course of conduct to establish the element of repetition. The negative conduct needs to occur on more than one occasion so as to distinguish it from a one-off act of aggression. In this manner, the element of repetition in the direct cyberbullying context is defined in the same way as it is defined in the traditional face-to-face bullying context.
Indirect cyberbullying occurs in the public cyber arena. It refers to material that has been posted to areas in cyberspace that are publically accessible. In circumstances where a perpetrator posts an electronic communication into a public forum, such as a public blog, a social media forum, or a video- sharing Web site, it is no longer necessary for the victim to prove a course of conduct to satisfy the element of repetition. Repetition occurs by virtue of the arena in which the behavior occurs. Material can remain in the public cyber arena indefi- nitely. It can be viewed publically countless times. It can be distributed, and it can be saved and re-posted at a later time. In the instance where an electronic communication has been sent directly to the victim but has, to the victim’s knowl- edge, been copied/forwarded to other people, the act of distribution propels the material out of the private domain and into the public arena. This negates the victim’s onus to establish a course of conduct to establish the element of repetition.
For the purpose of the definition of cyberbullying, repeti- tion in the private context (electronic communication between the perpetrator and the victim only) occurs as a result of multiple contacts; in the public arena (electronic communi- cation that has been distributed to persons other than the victim only), it can be established simply by its appearance in that forum.
Power Differential
Power imbalance (power differential) is another element considered by many researchers as an essential criterion to the cyberbullying definition. In the traditional bullying con- text, a power imbalance relates to the ‘‘demonstration or in- terpretation of power by the offender over the target.’’7 The meaning is not altered in the cyber context. Although a power imbalance may be achieved in various new ways in cyber- space, this does not alter the fact that, in order for conduct to qualify as cyberbullying, the conduct must place the vic- tim in a position where he/she cannot easily defend him/ herself.
In the physical world, a person’s characteristics such as popularity, height, intelligence, physical strength, age, sex, and socioeconomic status can give a perpetrator perceived or actual power over a victim.7 It is not uncommon to hear of instances where a larger student bullies a smaller student. The power imbalance between the two students is likely to result from the smaller student feeling defenseless against the physically much larger student. Additionally, factors such as low social integration, low self-esteem, a problematic parent– child relationship, or school-related behavioral problems have been established as determinates of school victimiza- tion.14 In the physical world, it is not uncommon to hear of situations where a bully targets a victim who displays signs of low social integration. This aspect makes the target a per- ceived easy target for the bully. There is a power imbalance
286 LANGOS
between the perpetrator and the target that defines the rela- tionship: where the perpetrator is perceived as the stronger party and the victim (the social outcast) as the weaker party who cannot easily defend him/herself against the bully. Known determinates of school victimization, along with a person’s physical characteristics, can act as ammunition a perpetrator uses to exploit power over a victim. Studies conducted on school children in Sweden, Germany, and Belgium demonstrate that targets of traditional bullying are more likely to become targets of cyberbullying.13–15 This would suggest that determinates of traditional bullying that enable a perpetrator to demonstrate actual or perceived power over a victim may also be determinates of cyberbul- lying. (The fact that a victim is perceived as a social outcast in the physical world may continue to be a reason for the con- tinued bullying of the victim in the parallel cyber world.) However, it is also possible that a perpetrator in cyberspace does not know his/her victim in a physical social context. Electronic media provide a novel platform for individuals to connect with strangers. In such cases, physical characteristics or other determinates of school victimization are unlikely to be the trigger for the cyberbullying.
In addition, cyberspace presents a bully with new oppor- tunities in which to flaunt their power over a perceived weaker victim. It has been suggested that varying degrees of technological skill may create a power differential between a perpetrator and a victim in the digital world.15 In this sense, a victim could feel powerless in defending him or herself against a perpetrator’s online actions as a result of the per- petrator’s perceived or actual greater technological expertise. Once online material enters the public online environment, as material can be disseminated, archived, reposted, or altered by people other than the victim or the perpetrator. This fact plays to a perpetrator’s perceived and actual power over the victim in the cyber context given the complexities associated with controlling material in cyberspace.
A perpetrator may feel emboldened to engage in cyber- bullying as a result of the perceived anonymity cyberspace presents. Cyberbullies are able to create pseudonyms and provisional e-mail addresses and to block their telephone number to conceal their identity. A victim is likely to feel increased feelings of powerlessness by not knowing the per- son behind the cyber aggression.15 In this manner, the victim could be interpreted as the weaker party.
The seemingly limitless nature of technology means a cy- berbully (as opposed to a schoolyard bully or a workplace bully) can penetrate the home environment. There are no spatial or time limitations. This factor awards a perpetrator the upper hand and ensures the victim feels powerless in comparison.16
Additionally, a victim may feel less able (and therefore more powerless) to defend him or herself against a potentially infinite cyber audience. In the physical world, the number of witnesses to bullying is likely to be far fewer.
The cyber environment creates a variety of new opportu- nities that can give rise to an exploitation of power in a perpetrator/victim relationship. The element of power imbalance remains and therefore an essential criterion that applies equally in both the private and public contexts. In either setting, physical or virtual, a victim’s lack of perceived or actual power comparative to the perpetrator’s possession of power is crucial to the definition.
Aggression and Intention
The bullying context
In the bullying context, the elements of intention and ag- gression are intrinsically linked. Defined as a subset of ag- gression,17 bullying inherently contains the same elements that frame the definition of aggression. What propels bullying out of the broad pool of merely aggressive behaviors into a new realm (or subset of aggression) are the necessary ele- ments of repetition and power imbalance.
Arguments for and against the inclusion of intention in a definition of bullying relate to the arguments advanced in the context of aggression.18–21 Those who argue against inclusion maintain the weaker argument. Without its inclusion, joking, jovial teasing, and inadvertent/accidental behaviors are captured in an overly broad meaning of bullying. In the same way, inadvertent online behaviors and common behaviors such as playful cyberteasing and cyberjoking, which do not require the elements of repetition, power imbalance, or in- tention to cause harm to the target, would be labeled ag- gressive cyber acts. An exclusion of the element of intention suggests that acts carried out in an attempt to cause a victim harm will not be deemed aggressive if harm does not mate- rialize.19 To differentiate behaviors, acts (online or otherwise) should only be deemed aggressive where the action was di- rected toward the goal of producing a negative consequence for a victim which that victim is motivated to avoid.
Intention in the Cyberbullying Context
Direct cyberbullying
It is necessary to consider the element of intention in re- lation to direct and indirect cyberbullying. Direct cyberbul- lying requires the perpetrator to engage in a course of conduct to fulfill the criterion of repetition. The repetitive conduct, in turn, may illustrate an intention to harm, as the conduct is not an inadvertent or isolated incident. Behavior demonstrated as a course of conduct is likely to implicate the perpetrator as having the desire and the knowledge that the victim would be harmed by the conduct. In this manner, repetition and intention may be considered related elements. The context of the conduct and form of words, images or sound used need to be taken into account.
Indirect cyberbullying
Let us presume that a perpetrator has posted material via ICTs into a public area of cyberspace. Brenner and Rehberg appropriately posit that two issues unique to indirect cyber- bullying arise in that instance. The first issue relates to the extent to which the cyberbully intentionally directed the on- line communication at the victim; the second issue relates to the extent to which the cyberbully intended the communi- cation to have a negative impact (harm) the victim.8
Thus, where material is posted in a public forum, it may be possible to determine the extent to which the cyberbully in- tentionally directed the online communication at the victim. For example, addressing the victim in the public forum by name may be considered reasonably strong evidence that the cyberbully intentionally directed the communication at the victim. There may be instances, however, where it is much more difficult to make this determination. Where material is
CYBERBULLYING: THE CHALLENGE TO DEFINE 287
posted to a public forum, but either restricted to a particular audience by virtue of privacy settings, or posted to an area of cyberspace where it would not readily come to the victim’s attention, establishing intention becomes problematic. The perpetrator has posted the material to an area where it is unlikely to become known to the victim.
Where the victim is deemed to be the intended target of the aggression, particularly hostile/malicious material is more likely to be deemed material that is intended to have a negative impact on the victim. Where the material posted is not of the type that is clearly intended to harm the victim, it will be more arduous to fulfill the criterion of intention. The context of the cyberbullying and the form of words, images or sound used will be relevant.
How Intention Could Be Established
It is clear that the subjective nature of intention can make this element difficult to establish in some instances. To assist in making a determination, it may be appropriate to take into account the age of a perpetrator.8 A younger child is likely to have a reduced capacity to appreciate the consequences of his/her actions than an adult because of a child’s less- developed stage of maturity.8 Research findings suggest that the relationship between victim and perpetrator plays an im- portant role in the way conduct is interpreted.15 Others suggest it is a victim’s perception of the incident rather than the in- tention of the other that should be considered.12,20 It is the view of the author that intention is best determined based on how a reasonable person would perceive the perpetrator’s conduct.
The reasonable person approach is an objective test that measures the conduct of the perpetrator against conduct of a hypothetical reasonable person placed in a similar position as the victim. This approach is widely adopted in both criminal law and law of torts. In Australia, it is not uncommon for offences to be defined by the reasonable person test in relation to harassment or workplace bullying.22 Applying the reason- able person standard to the cyberbullying context would set some boundaries to an establishing intention. It would serve as a practical tool for diminishing the level of subjectivity from a finding of intention. By introducing the reasonable person standard as an objective measurement of conduct, intention becomes a practicable element of the definition.
A Suggested Descriptive Definition
In light of the above, an appropriate descriptive definition is suggested:
Cyberbullying involves the use of ICTs to carry out a series of acts as in the case of direct cyberbullying, or an act as in the case of indirect cyberbullying, intended to harm another (the victim) who cannot easily defend him or herself.
Direct cyberbullying involves a perpetrator repeatedly di- recting unwanted electronic communications to a victim who cannot easily defend him or herself with the intent to harm the victim.
Indirect cyberbullying involves directing a single or repeated unwanted electronic communications to a victim who cannot easily defend him or herself with the intent to harm the victim.
An intention to harm is established where a reasonable person, adopting the position of the victim and having regard to all the circumstances, would regard the series of acts or an act as acts or an act intended to harm to the victim.
Electronic communication includes (but is not limited to) any transfer of signs signals, writing, images, sounds, data transferred whole or in part by wire, radio, a photo electronic or photo optical system, including electronic mail, Internet communications, instant messages, and facsimile communi- cations.
Harm refers to emotional harm. The elements of power imbalance, aggression, and inten-
tion (which are intrinsically linked) and the use of ICTs are all included in the above description. The altered meaning of repetition in the indirect cyberbullying context is captured by differentiating between direct and indirect cyberbullying.
Conclusion
To address the phenomenon of cyberbullying, it is imper- ative to know what it is. A workable definition is crucial. This article has presented a model definition that encompasses both direct and indirect cyberbullying. The definition high- lights the importance and applicability of traditional elements of bullying in relation to cyberbullying. Traditional face-to- face bullying requires a course of conduct to be established before the criterion of repetition is satisfied, and this aspect is retained in the model definition. The meaning of repetition in the cyber context is, however, altered in relation to indirect cyberbullying because of the public nature of the material once it enters the public online domain. Power imbalance is an equally essential criterion to cyberbullying and is pre- served in the cyber context. The elements of intention and aggression are intrinsically linked and are fundamental as- pects of this proposed cyberbullying definition.
Disclosure Statement
No competing financial interests exist.
References
1. Espelage D, Swearer S. Research on school bullying and victimization: what have we learned and where do we go from here? School Psychology Review 2003; 3:365–383.
2. Monks C, Smith P. Definitions of bullying: age differences in understanding of the term, and the role of experience. British Journal of Development Psychology 2006; 24:801–821.
3. Cross D, Shaw T, Hearn L, et al. (2009) Australian covert bullying prevalence study. Edith Cowan University, Perth: Child Health Promotion Research Centre.
4. Olweus D. Familial and temperamental determinants of aggressive behavior in adolescent boys: a causal analysis. Developmental Psychology 1980; 16:644–660.
5. Rigby K. Effects of peer victimisation in schools and per- ceived social support on adolescent well-being. Journal of Adolescence 2000; 23:57–68.
6. Smith PK, Mahdavi J, Carvalho M, et al. Cyberbullying: its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry 2008; 49:376–385.
7. Hinduja S, Patchin JW. (2009) Bullying beyond the schoolyard: preventing and responding to cyberbullying. Thousand Oaks, CA: Corwin Press.
8. Brenner SW, Rehberg M. ‘‘Kiddie Crime’’? The utility of criminal law. First amendment law review 2009; 8:1–85.
9. Patchin JW, Hinduja S. Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Violence & Ju- venile Justice 2006; 4:148–169.
288 LANGOS
10. Li Q. New bottle but old wine: a research of cyberbullying in schools. Computers in Human Behavior 2007; 23:1777–1791.
11. Olweus D. Bully/victim problems in school: knowledge base and an effective intervention program. Irish Journal of Psychology 1997; 18:170–190.
12. Nocentini A, Calmaestra J, Schultze-Krumbholz A, et al. Cyberbullying: labels, behaviors and definition in three european countries. Australian Journal of Guidance and Counselling 2010; 20:129–142.
13. Slonje R, Smith PK. Cyberbullying: another main type of bullying? Scandinavian Journal of Psychology 2008; 49:147– 154.
14. Katzer C, Fetchenhauer D, Belschak F. Cyberbullying: who are the victims? A comparison of victimization in Internet chatrooms and victimization in school. Journal of Media Psychology 2009; 21:25–36.
15. Vandabosch H, Cleemput K. Defining cyberbullying: a qualitative research into perceptions of youngsters. Cy- berpsychology & Behavior 2008; 11:499–503.
16. Dooley J, Pyzalski J, Cross D. Cyberbullying versus face-to- face bullying: a theoretical and conceptual review. Journal of Psychology 2009; 217:182–188.
17. Smith PK, Cowie H, Olafsson RF, et al. Definitions of bul- lying: a comparison of terms used, and age and gender differences, in a fourteen-country international comparison. Child Development 2002; 73:1119–1133.
18. Geen RG. (2001) Human aggression. Buckingham, England; Philadelphia, PA: Open University Press.
19. Baron RA. (1977) Human aggression. New York: Plenum Press. 20. Tattum D. A whole-school response: from crisis manage-
ment to prevention. Irish Journal of Psychology 1997; 18: 221–232.
21. Guerin S, Hennessy E. Pupils’ definitions of bullying. European Journal of Psychology of Education 2002; 17:249– 261.
22. Equal Opportunity Act 1984 (SA), s 87(9) (Austl); Sex Dis- crimination Act 1984 (Cth), s 28A(1) (Austl.); Criminal Code Act 1995 (Cth), s 474.17 (1)(b) (Austl.); Occupational Health Safety and Welfare Act 1986 (SA), s 55 A(1) (Austl.).
Address correspondence to: Colette Langos
Centre for Regulation and Market Analysis and School of Law
University of South Australia GPO Box 2471
Adelaide South Australia 5001
Australia
E-mail: [email protected]
CYBERBULLYING: THE CHALLENGE TO DEFINE 289
Copyright of CyberPsychology, Behavior & Social Networking is the property of Mary Ann Liebert, Inc. and
its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's
express written permission. However, users may print, download, or email articles for individual use.
Psychology of Popular Media Culture
Anonymously Hurting Others Online: The Effect of Anonymity on Cyberbullying Frequency Christopher P. Barlett Online First Publication, November 4, 2013. doi: 10.1037/a0034335
CITATION Barlett, C. P. (2013, November 4). Anonymously Hurting Others Online: The Effect of Anonymity on Cyberbullying Frequency. Psychology of Popular Media Culture. Advance online publication. doi: 10.1037/a0034335
Anonymously Hurting Others Online: The Effect of Anonymity on Cyberbullying Frequency
Christopher P. Barlett Gettysburg College
Cyberbullying (CB) has recently become a significant issue in today’s society. Given the myriad negative consequences to the cyber-victim, it is important to determine what variables predict CB frequency. Based on broader psychological and communication theory, I predict that anonymity will (a) directly predict CB frequency, (b) moderate the relation between positive attitudes toward CB and CB frequency, and (c) mediate the relation between instant messaging frequency and CB behavior. Participants (N � 181) completed measures designed to assess these aforementioned variables. Results showed that positive attitudes toward CB, CB reinforcement, and anonymity strongly predicted CB frequency. Furthermore, moderation tests confirmed that CB was highest when positive attitudes and anonymity were both high. Finally, mediation tests revealed anonymity mediated the relation between instant messaging frequency and CB behav- ior. These results are important at elucidating what variables predict CB to hopefully inform intervention efforts aimed at reducing CB.
Keywords: cyberbullying, anonymity, attitudes
Violent and aggressive behaviors are not new behavioral phenomena. However, the method by which aggressive acts are delivered has changed with increased technology. For exam- ple, Anderson and Huesmann (2003) stated that violent behaviors rose dramatically with the ac- cessibility of handguns. In today’s technology- based culture, individuals are now turning to electronic means (e.g., Internet, texting) to harm others, termed cyberbullying (CB) (defined as, “. . . the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defam- atory personal Web sites, and defamatory online personal polling Web sites to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others” [cited in Li, 2007, p. 1779]). CB is a serious societal issue owing to the extensive harm it can cause
the victim. Indeed, research has shown that those who are cyber-victimized are at risk for heightened negative psychological (fearful [Be- ran & Li, 2005], depressed [Patchin & Hinduja, 2006], suicide ideation [Hinduja & Patchin, 2010], and anger [Beran & Li, 2005]) and be- havioral (drug abuse [Hinduja & Patchin, 2008] and poor school grades [Beran & Li, 2007]) outcomes.
To date, the majority of the CB literature has focused on the victim. Although important, a better understanding of the predictors of CB is needed to not only understand why people harm others using electronic methods, but also to inform interventions aimed at reducing CB. Relative to the literature focusing on the cyber- victim, there is a paucity of research testing what factors enhance or reduce the likelihood of CB. Consistent with broader aggression theory, research has shown positive correlations be- tween CB frequency and traditional bullying frequency (Smith et al., 2008), normative ag- gressive beliefs (Ang, Tan, & Mansor, 2011), and low empathy (Ang & Goh, 2010; Steffgen, Konig, Pfetsch, & Melzer, 2011). However, many additional factors can influence CB, such as one’s attitudes toward CB, reinforcement, and identification. The objective of the current study is to elucidate on these aforementioned
Christopher P. Barlett, Department of Psychology, Get- tysburg College.
Correspondence concerning this article should be ad- dressed to Christopher P. Barlett, Department of Psychol- ogy, Gettysburg College, Campus Box 0407, 300 North Washington Street, Gettysburg, PA 17325. E-mail: [email protected]
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
Psychology of Popular Media Culture © 2013 American Psychological Association 2013, Vol. 2, No. 4, 000 2160-4134/13/$12.00 DOI: 10.1037/a0034335
1
factors. In doing so, the results of this study may be important in indentifying the predictors of CB to guide intervention efforts at reducing this harmful “newer” form of aggression.
The Role of Anonymity
In the online world, an aggressor will not be face-to-face with their victim. This would imply that anonymity should increase CB behavior; however, research has shown that traditional bullying is more common than CB (Olweus, 2012), and traditional bullies can harm others using covert aggressive tactics (e.g., gossiping, rumor spreading). Therefore, it is possible that anonymity can increase both traditional bully- ing and CB. Indeed, literature from broader social psychological and communication theo- ries have shown that anonymity is related to aggressive behavior (Diener, 1976; see also An- derson & Bushman, 1997) owing to deindividu- ation processes. However, the focus of the cur- rent study was to understand what variables may predict CB behavior, and there is a paucity of research empirically testing anonymity’s contribution.
In the mediated world, anonymity is pro- nounced because a) the aggressor is not as iden- tifiable and can use fake usernames, b) the bully does not need to have a previous relationship with the victim, and c) no physical scars or marks are inflicted on the victim from the bully. In other words, the aggressor’s anonymity may enhance the frequency of which CB (vs. tradi- tional bullying) occurs. It should be noted that anonymity is not a necessary condition for CB. It is likely the case that the cyber-victim also knows the cyberbully; however, that is not al- ways the case. Furthermore, a cyberbully may not truly be anonymous. Phone numbers can be traced and IP addresses can be identified, lead- ing to low anonymity. However, feeling anon- ymous and being anonymous are not identical and even if the cyber-victim can identify their aggressor, the bully may still feel anonymous, which may predict CB frequency.
Surveys using adolescent samples have indi- cated that 29% of adolescent cyber-victims could not identify their aggressor (Patchin & Hinduja, 2006). Furthermore, in 2011, the Cen- ter for Disease Control (CDC, 2011) conducted a survey of adolescents who reported being cyberbullied. Their report indicated that of
those cyberbullied, 67% of the CB occurred on instant messenger (IM), whereas only 17% oc- curred via text messaging and 21% using e-mail (percentages were not mutually exclusive). IM may enhance anonymity to the aggressor through the use of handles (made up electronic names) rather than one’s actual name, compared with texting or e-mailing where one’s name (and phone number/e-mail address) are easily accessible, decreasing the likelihood of ano- nymity. Although, it is hypothesized that IM frequency will better predict CB than texting or e-mail frequency, a cyberbully can create a fake e-mail address to attack others online. However, using IM as a means to aggress may still feel anonymous relative to e-mail frequency. No research has explicitly tested this claim and will be tested in the current study.
Theoretical Predictors of CB
To date, several researchers have suggested that one defining characteristic that differenti- ates CB from traditional bullying is enhanced anonymity for the aggressor (Li, 2007; Smith et al., 2008; Vandebosch & Van Cleemput, 2008). Indeed, Herring (2001) stated that the perceived anonymity afforded in the mediated world in- creases the likelihood of aggressive and hostile acts, as evident by the research showing that the majority of cyber-victims do not know their aggressor (Kowalski & Limber, 2007). Despite this wealth of research and speculation regard- ing anonymity’s influence on CB, there is a paucity of research empirically testing these relations and few theoretical postulations to make informed predictions to suggest how an- onymity is related to CB.
Recently, Barlett and Gentile (2012) tested a theoretical model that focused on the distal learning processes involved in CB. Drawing on broader social–cognitive learning theories of aggression (e.g., General Aggression Model; Anderson & Bushman, 2002), their model pos- its that each successful positively reinforced instance of CB is a learning trial. Continued learning is related to the development of learned knowledge structures that predict CB. In other words, Barlett and Gentile (2012) posited that when one continues to cyberbully another, the aggressor will ascertain certain knowledge re- garding the outcomes. Barlett and Gentile (2012) postulated and found evidence to sug-
2 BARLETT
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
gest that continued and successful learned CB is related to the development of two specific learned associations: anonymity and the lack of power differential. The former construct (ano- nymity) is the focus of the current research. According to Barlett and Gentile (2012), cyber- bullies believe that they are perceived as anon- ymous in the mediated world after they success- fully harm another several times. Also, in their model, Barlett and Gentile (2012) found that perceived anonymity directly predicts both CB frequency and positive attitudes toward CB. Mediation tests of their model showed that anonymity is related to CB frequency because of positive attitudes toward CB (the mediator). In other words, perceived anonym- ity predicts the development of positive atti- tudes toward CB, which in turn predicts CB frequency (see Figure 1).
As seen in Figure 1, anonymity can serve as both a mediator and moderator when predicting CB. Notably, when learning is the primary in- dependent variable, anonymity can serve as a mediator in the path to CB frequency. However, anonymity can also serve as a moderator vari- able in the relation between positive attitudes toward CB and CB frequency. Thus, depending on what part of the model one is addressing, anonymity serves different roles. The current study will test both the mediating role of ano- nymity in the relation between media usage and CB frequency, as well as the moderating role of anonymity in the relation between positive atti- tudes toward CB and CB frequency. The inves- tigation of how anonymity is related to CB frequency is of theoretical importance. Barlett and Gentile (2012) showed that anonymity is an important predictor in CB frequency without testing whether anonymity mediates or moder-
ates the relations predicted in the Barlett and Gentile (2012) model. This is the purpose of the current study.
Overview of the Current Study
The purposes of the study was to further test and validate the Barlett and Gentile (2012) model focusing on how anonymity is related to CB frequency. It is hypothesized that instant messaging (rather than e-mail) would be related to CB and anonymity would mediate this rela- tionship. Furthermore, anonymity should mod- erate the relation between positive attitudes to- ward CB and CB frequency.
Method
Participants
Data were collected in the Fall of 2010. One hundred and eighty-one (57% female) under- graduate students from a large Midwestern Uni- versity participated in the study for partial course credit in their psychology classes. The average age of the sample was 19.47 (SD � 1.56) years. The majority (79%) were Cauca- sian. The majority of participants were in their first or second year of undergraduate education (80%).
Materials and Procedure
On completion of the informed consent, par- ticipants completed the following question- naires and then were thanked and fully de- briefed.
CB frequency. The past research in the CB literature has used dozens of different question-
Anonymity
Posi�ve A�tudes towards
Cyberbullying
Cyberbullying Frequency
Learned Cyberbullying
Behaviors
Figure 1. Extensions of the Barlett and Gentile (2012) model.
3CYBERBULLYING
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
naires to assess CB frequency. According to Rivers and Noret (2010), such diversity in mea- sures is one (of several) reason why CB fre- quency percentages vary from study to study. The diverse numbers of measures each differ in important respects. For instance, some research- ers use a Likert-like rating scale (e.g., Ybarra, Diener-West, & Leaf, 2007), whereas others use dichotomous estimates of CB (e.g., Li, 2007). Furthermore, some researchers define CB to the participant (e.g., Li, 2007), whereas others do not (e.g., Ang & Goh, 2010). Overall, there is no current “gold standard” measure of CB fre- quency. The CB frequency questionnaire used in the current study (see below for details) was used because it measured CB behavior ade- quately; it was based on a valid measure of media exposure of TV, movie, and video game violence (Gentile, Lynch, Linder, & Walsh, 2004). The CB scale used in the current study had participants indicate their level of CB with- out being explicit regarding what was being measured, akin to other measures that did not use definitions (although participants could probably infer what was being measured).
For the purposes of the current research, CB frequency was calculated using an adapted ver- sion of the Media Habits Questionnaire (Gentile et al., 2004). Participants were instructed to list their three favorite Web sites. For each Web site they listed, they rated it on how often they visited the Web site, how often they write mean messages to others on this Web site, and how often they posted mean comments about others on the Web site on a 1 (rarely) to 5 (all the time) rating scale.1 If participants only listed two, rather than three, favorite Web sites, for exam- ple, then the items designed for the third Web site were assigned a value of zero (see Anderson & Dill, 2000). The frequency rating was multi- plied by the write mean messages rating and then averaged across all three Web sites to get a CB via writing mean messages estimate. The same formula was applied to the posting mean comments ratings. These two estimates (posting mean messages and writing mean messages) were averaged to produce an estimate of CB via the Internet (� � .87). Higher scores indicate more CB. Akin to other measures of CB, the data for this were positively skewed; however, given the sample size, no corrections (e.g., log transforming) were done.
Traditional bullying. The Ybarra et al. (2007) traditional bullying scale was used to assess frequency of traditional, or face-to-face, bullying. This is a three-item questionnaire that asks participants how often they aggressed against others using a 1 (never) to 6 (everyday/ almost everyday) rating scale (� � .75). A sample item includes, “Made rude comments or mean comments to anyone.” The three items were summed such that higher scores indicated higher reported frequency of face- to-face bullying.
Positive Attitudes Toward CB. The re- searcher-created Positive Attitudes toward Cy- berbullying questionnaire (Barlett & Gentile, 2012) was used (� � .95). This is a 20-item questionnaire that asks participants their level of agreement with the items on a 1 (strongly disagree) to 5 (strongly agree) rating scale. A sample item includes, “It is OK to bully others online if they deserve it.” These items were summed, such that higher scores indicate more positive attitudes toward CB.
Anonymity. The researcher-created Atti- tudes toward Anonymity questionnaire (Barlett & Gentile, 2012) was used (� � .71). This is a five-item questionnaire that asks participants their level of agreement with the items on a 1 (strongly disagree) to 5 (strongly agree) rating scale. A sample item includes, “I feel comfort- able sending mean text messages or e-mails to anybody no matter if I know them or not.”
1 The original version of this questionnaire asks partici- pants to list their three favorite movies, TV shows, and video games. Thus, the adapted version used here only asked participants to list their three favorite Web sites. The term “Web site” was not defined for participants; however, that is a trivial absence. The primary focus for using this questionnaire was to ascertain how frequently participants visited the Web site and how often they cyberbullied using this Web site. This measure afforded the researchers a wide variety of options. For instance, a score of 0 could indicate that a) the Web site participant’s visited does not allow for CB (e.g., www.iastate.edu), or b) the Web site participant’s visited does afford possible CB opportunities (e.g., www .Facebook.com; the most favored Web site in this sample), but no such behavior is reported. Conversely, if the favored Web site does afford CB opportunities, then it is likely through these two options (posting mean comments or writ- ing mean messages to others). Other methods of CB can exist on several Web sites that are not measured here (e.g., social exclusion, posting videos, etc.); however, based on the definition of CB used in this study and knowledge that social networking Web sites would most likely be favored over other Web sites, this was a valid measure of CB.
4 BARLETT
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
These items were summed, such that higher scores indicate more positive attitudes toward anonymity in CB.
Demographic questionnaire. A demo- graphic questionnaire was used to assess sex, ethnicity, year in school, age, and other relevant demographic information.
Media frequency. To estimate weekly av- erages of instant messaging and e-mailing, an adapted version of the Media Habits Question- naire (Gentile et al., 2004) was used.2 To com- pute weekly e-mail frequency, participants in- dicated how many hours they e-mailed others (and checked e-mail) on an average weekday and weekend day during the following times: 6 a.m. to noon, noon to 6 p.m., 6 p.m. to midnight, and midnight to 6 a.m. The weekday times were added and multiplied by five. This estimate was added to the product of the week- end days multiplied by two. This formula was applied to instant messaging time. Thus, the range of possible scores was from 0 to 168 with higher scores indicating more frequency. Al- though results showed that these data were pos- itively skewed, no data transformations were conducted, because with a high sample size, the population distribution of scores approximates a normal distribution.
Results
Zero-Order Correlations
Table 1 displays the zero-order correlations between relevant variables. As expected, CB
frequency was positively correlated with posi- tive attitudes toward CB (r � .60, p � .001), perceived anonymity (r � .52, p � .001), and instant messaging frequency (r � .40, p � .001). CB was uncorrelated with e-mail fre- quency. This latter finding suggests that instant messaging is likely to be the method by which CB is manifested, rather than e-mail. Indeed, instant messaging frequency was also positively correlated with anonymity (r � .20, p � .001) and positive attitudes toward CB (r � .23, p � .001). E-mail frequency was uncorrelated with these aforementioned variables (rs � .11, ns).
Difference in Correlation Test
Prior to testing the moderating and mediating influence of anonymity in the relation between CB, it was of theoretical importance to show evidence that perceived anonymity was more strongly associated with CB than traditional bullying. A difference in correlation test for dependent samples was conducted (Cohen & Cohen, 1983). Results show a significant differ- ence, t(177) � 2.99, p � .05, in the magnitude of the relation between CB and anonymity (r � .52) and traditional bullying and anonymity (r � .30), while controlling for the colinearity of traditional bullying and CB (r � .31). This suggests that although the relation between tra- ditional bullying and anonymity was significant, this relation was stronger when CB was the predictor.
Moderation Test
Next, moderation tests were conducted to test the hypotheses of the current study. The Hayes and Matthes (2009) moderation MACRO for SPSS was used. This analysis tests the relation- ship between the independent variable (positive attitudes toward CB) and the dependent variable (CB frequency) at high (�1 SD) and low (�1 SD) level of the moderator (anonymity).
Results showed significant moderation, b � .01, se � .002, t(171) � 3.883, p � .001. The relation between positive attitudes toward CB and CB was significant when anonymity was high, b � .09, se � .01, t(171) � 6.14, p �
2 This measure was adapted by asking participants how many hours they were on IM and e-mail. The original version asked identical questions, but about video game use not IM or e-mail.
Table 1 Correlations Between Relevant Variables
1 2 3 4 5 6 7
1 — 2 .52�� — 3 .60�� .69�� — 4 .40�� .20�� .23�� — 5 .04 �.03 �.03 .53�� — 6 .31�� .30�� .40�� .09 �.02 — 7 .10 .07 .21�� .00 �.005 .17� — Mean 4.61 10.57 34.67 8.62 15.57 5.44 �0.16 SD 2.81 4.12 15.47 19.20 16.79 2.53 0.99
Note. 1 � Cyberbullying; 2 � Anonymity; 3 � Positive Attitudes toward Cyberbullying; 4 � Instant Messaging Frequency; 5 � E-mail Frequency; 6 � Traditional Bully- ing; 7 � Sex (1 � male; �1 � female). � p � .05. �� p � .01.
5CYBERBULLYING
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
.001, but not when anonymity was low b � .03, se � .02, t(171) � 1.66, p � .05 (see Figure 2).
Path Model
To test the mediating mechanisms within the Barlett and Gentile (2012) model, path analysis using MPLUS was used. The raw data were used for analysis (rather than inputting the correlation or covariance matrix). Instant mes- saging and e-mail frequency were correlated independent variables predicting anonymity, positive attitudes toward CB, and CB fre- quency. Anonymity and positive attitudes to- ward CB also predicted CB frequency. Finally, anonymity predicted positive attitudes toward CB (see Figure 3). Because all possible paths and correlations were estimated, the estimated variance–covariance matrix was identical to the actual variance–covariance matrix, making the model a perfect fit of the data (i.e., no degrees of freedom to estimate model fit indices; �2 � 0.00, Comparative Fit Index (CFI) � 1.00, Tucker-Lewis Index (TLI) � 1.00, Root Mean Square Error of Approximation (RMSEA) � 0.00, Standardized Root Mean Square Residual (SRMR) � 0.00, which is better than the base- line model in which all variables are uncorre- lated, �2 � 241.385 (df � 9), p � .00001).
Examination of the path coefficients showed that instant messaging frequency (� � .34, p � .001), positive attitudes toward CB (� � .41, p � .001), and anonymity (� � .16, p � .001) positively predicted CB frequency. E-mail fre- quency was negatively related to CB frequency (� � �.13, p � .05). Both e-mailing and instant messaging frequency predicted anonymity (� � �.18, p � .04; � � .29, p � .001, respectively); however, only instant messaging frequency (not e-mail frequency) predicted positive attitudes toward CB (� � .14, p � .04). Finally, ano- nymity predicted positive attitudes toward CB (� � .66, p � .001). The correlation between e-mail and IM frequency was significant, r � .53, p � .001. Indirect tests confirmed that the path from instant messaging frequency to ano- nymity to positive attitudes toward CB to CB frequency was significant (Indirect b � .08, t � 2.96, p � .01). The same indirect test involving e-mail frequency showed the opposite pattern (Indirect b � �.05, t � �1.97, p � .05).3
E-mail Versus Instant Messaging Frequency
The previous results show strong support for the importance of how different media outlets (i.e., IM and e-mail) influence anonymity, which, in turn, predicts CB frequency. How- ever, some may suggest that these results are driven by the fact that some individuals may simply use IM more frequently than e-mail. If true, such an explanation may provide an alter- native explanation to the previous findings. To test this, a repeated measures ANOVA was run to compare the frequency for IM to e-mail. Results showed that people spent significantly, F(1, 183) � 28.70, p � .001, partial 2 � .14, more time on e-mail (M � 15.57, SD � 16.79) than IM (M � 8.62, SD � 19.20). This pro- vides further support for the findings in the path model.
Conclusion
Overall, results support the hypotheses of the current study and show strong support that an- onymity is an important predictor of CB behav- ior. Consistent with the learning postulations of the Barlett and Gentile (2012) model, anonym- ity was both a mediator in the relation between instant messaging frequency and CB, but also a moderator in the relation between positive atti- tudes toward CB and CB frequency. This sug- gests that when individuals learn that CB is anonymous and the negative consequences are rare (given said anonymity), CB is likely to occur.
General Discussion
CB is an emerging societal problem. As sug- gested by Barlett and Gentile (2012), the liter- ature in this domain has been mostly descriptive and atheoretical. The purpose of the current research was to further our understanding of what variables predict CB behaviors in an at- tempt to (a) further advance theory by testing
3 Postexamination of the path coefficients showed one nonsignificant path (positive attitudes toward CB regressed onto e-mail frequency; see Figure 3). This path was set to 0 to estimate model fit indices. Results showed that this model was a good fit for the data (�2 � 1.38 (df � 1), p � .24, CFI � 1.00, TLI � 0.99, RMSEA � 0.05, SRMR � 0.01).
6 BARLETT
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
how anonymity is important to CB, (b) eluci- date on the predictors related to CB behaviors, and (c) use these findings to help inform future interventions aimed at reducing CB.
CB and Theory
Results from the current study support the postulations of the Barlett and Gentile (2012)
0.00
2.00
4.00
6.00
8.00
10.00
12.00
Low (-1 SD) High (+1 SD)
Anonymity
Cy be
rb ul
ly in
g Fr
eq ue
nc y
Low CB A� (-1 SD)
High CB A� (+1 SD)
Figure 2. The moderating influence of anonymity in the relation between positive attitudes toward CB and CB frequency.
Instant Messaging Frequency
Emailing
Frequency
Positive Attitudes of
Cyberbullying Cyberbullying
Frequency
.34***
.41***
.29***
-.18*
.53***
Anonymity .67***
.16*
.14*
-.13* -.08
Figure 3. Mediated path model. � p � .05, ��� p � .001. Single headed arrows are regression coefficients whereas double headed arrows are correlations. Dashed lines indicate nonsignif- icant (p � .05) relations.
7CYBERBULLYING
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
model. This model posits that with continued CB experiences, individuals are likely to learn that they are more likely to be anonymous. Accompanied with the lack of power differen- tial, such anonymity leads to the development of positive attitudes toward CB, which predicts subsequent CB behavior. Support for the role of anonymity in CB was found in myriad ways. First, results showed that anonymity was corre- lated with both positive attitudes toward CB and CB frequency. Second, results showed that an- onymity moderated the relation between posi- tive attitudes toward CB and CB behavior. This suggests that CB is more likely when positive attitudes are high and anonymity is high. Third, anonymity significantly mediated the relation between instant messaging frequency and CB. This suggests that the reason why instant mes- saging frequency was positively related to CB was because individuals feel anonymous. Fi- nally, e-mail frequency was negatively related to anonymity and positive attitudes toward CB whereas instant messaging frequency was pos- itively related to such attitudes and behaviors. If theory is correct, this finding can be explained by the hypothesis that e-mail may be more identifiable than instant messaging.
Although these results regarding the impor- tance of anonymity are important to understand- ing the variables that predict CB behavior, the questionnaire used in the current research mea- sures anonymity attitudes. It has been argued that perceived anonymity may be more impor- tant than actual anonymity; however, that is speculative and future research should test this empirically. In the real-world, a cyberbully’s anonymity is not assured especially when be- haviors escalate to very aggressive or violent behaviors. The current study provided empirical data to suggest that perceived anonymity is an important contributing factor to predict CB, and, clearly, future work is needed to test under what conditions perceived versus real anonym- ity differentially affects such social behaviors.
Limitations and Future Research
Like all psychological research, limitations do exist that need be studied in future research. First, these data are limited by their correla- tional nature, and causal claims regarding the relations in this study cannot be made. Future research should use either an experimental or
longitudinal research design to test these hy- potheses. However, recent work by Barlett and Gentile (2012) used a longitudinal design to test similar hypotheses regarding the causal mecha- nisms of CB, and results were consistent to what was reported in this study. However, these studies have their limitations too. For example, Barlett and Gentile (2012) only used a two- month lag between scale administrations in their longitudinal study. Future research is des- perately needed in this domain.
Second, the current study used a college-aged sample. It could be argued that the frequency of CB peaks during junior high and high school years; however, no published work has tested such age comparisons. However, if significant relations can be found that test important theo- retical postulations in a population that uses CB less frequently, then it could be argued that the relations would be stronger for adolescents. However, future research should test these re- lations on adolescents to see whether the rela- tions reported herein with a college-aged sam- ple are similar or different.
Third, the measure of CB behavior was lim- ited to only measuring CB over the Internet. A complete definition of CB should consist of other means of technology (text messaging, over video game consoles, etc.). However, text messaging is not as anonymous as other forms of media (e.g., instant messaging), and the pur- pose of the study was to use a measure of CB that would have variance captured by the ano- nymity construct. Under certain circumstances, any social media communication can be anon- ymous (e.g., phone numbers can be withheld, video gamers can create avatars, people can create e-mail accounts with fake names, etc.). Future research should attempt to create and validate a measure of anonymity across various platforms to get a more comprehensive measure of anonymity in the cyber-world. Additionally, the measure of CB used in the current study is similar to other validated CB scales that ask how frequently people harm others while “on- line” (Ybarra et al., 2007). Future research should use other CB questionnaires to deter- mine whether the results replicate, and based on past research it should. For instance, Barlett and Gentile (2012) used the Ybarra et al. (2007) measure of CB and showed correlations similar to those presented in Table 1.
8 BARLETT
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
Fourth, related to the measure of CB used in the current study, no definitions or content of “mean messages” were provided. Further for ethical reasons, participants were not asked to indicate exactly what they would write if they indicated they had, in fact, written a mean on- line message. It was presumed that participants who score high on CB using this measure may not even remember every mean message or post. However, writing what participants con- sider mean messages fits the definition of CB.
Finally, future research should attempt to measure the impact of anonymity (or perceived anonymity) with other face-to-face measures. Olweus (2012) suggested that traditional bully- ing and CB are similar to one another; however, the reported frequency of CB is lower than traditional bullying. If that is true, then per- ceived anonymity should correlate with both forms of bullying to the same degree. This would specifically test whether anonymity is one defining characteristic of online versus of- fline aggression. However, caution must be used in doing such an analysis, because of (a) the high correlation between CB and traditional bullying (Barlett & Gentile, 2012), (b) the dif- ficulty in measuring anonymity given the constantly shifting online-world, and (c) the dif- ficulty in differentiating between traditional bullying from an anonymous source from CB from a known source. This is clearly an area of future work that needs attention. Furthermore, specifically related to the previous comment, future work should also attempt to develop valid and reliable measures of perceived anonymity (rather than attitudes toward anonymity) that can be assessed at the time the CB occurs.
Final Comments
Examining the predictors of CB is important. If such predictors can be tested, results repli- cated, and theory enhanced, then interventions can be formulated to reduce CB behavior. The current study is an important step in elucidating on what factors predict CB processes. It is clear that attitudes toward anonymity and CB rein- forcement are strong predictors of CB that should be targeted in future work and interven- tions.
References
Anderson, C. A., & Bushman, B. J. (1997). External validity of “trivial” experiments: The case of lab- oratory aggression. Review of General Psychology, 1, 19–41. doi:10.1037/1089-2680.1.1.19
Anderson, C. A., & Bushman, B. J. (2002). Human aggression. Annual Review of Psychology, 53, 27– 51. doi:10.1146/annurev.psych.53.100901.135231
Anderson, C. A., & Dill, K. E. (2000). Video games and aggressive thoughts, feelings, and behavior in the laboratory and in life. Journal of Personality and Social Psychology, 78, 772–790. doi:10.1037/ 0022-3514.78.4.772
Anderson, C. A., & Huesmann, L. R. (2003). Human aggression: A social-cognitive view. In M. A. Hogg & J. Cooper (Eds.), Handbook of social psychology (pp. 296–323). London: Sage.
Ang, R. P., & Goh, D. H. (2010). Cyberbullying among adolescents: The role of affective and cog- nitive empathy, and gender. Child Psychiatry and Human Development, 41, 387–397. doi:10.1007/ s10578-010-0176-3
Ang, R. P., Tan, K., & Mansor, A. T. (2011). Nor- mative beliefs about aggression as a mediator of narcissistic explitativeness and cyberbullying. Journal of Interpersonal Violence, 26, 2619–2634. doi:10.1177/0886260510388286
Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The formation of cyberbullying in late adolescence. Psychology of Popular Media Culture, 1, 123–135. doi:10.1037/a0028113
Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32, 265–277. doi:10.2190/8YQM-B04H-PG4D-BLLH
Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Stu- dent Wellbeing, 1, 15–33.
Center for Disease Control. (2011). Electronic ag- gression: Emerging adolescent health issue. Re- trieved from http://www.cdc.gov/features/ electronicaggression/. Retrieved October 24, 2011.
Cohen, J., & Cohen, P. (1983). Applied multiple regression/correlation analysis for the behavioral sciences. Hillsdale, NJ; New York: Erlbaum Assoc.
Diener, E. (1976). Effects of prior destructive behav- ior, anonymity, and group presence on deindividu- ation and aggression. Journal of Personality and Social Psychology, 33, 497–507. doi:10.1037/ 0022-3514.33.5.497
Gentile, D. A., Lynch, P., Linder, J., & Walsh, D. (2004). The effects of violent video game habits on adolescent’s aggressive attitudes and behaviors. Journal of Adolescence, 27, 5–22. doi:10.1016/j .adolescence.2003.10.002
9CYBERBULLYING
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
Hayes, A. F., & Matthes, J. (2009). Computational procedures for probing interactions in OLS and logistic regression: SPSS and SAS implementa- tions. Behavior Research Methods, 41, 924–936. doi:10.3758/BRM.41.3.924
Herring, S. (2001). Gender and power in online com- munication. Retrieved from https://scholarworks. iu.edu/dspace/bitstream/handle/2022/1024/WP01- 05B.html. Retrieval date: 8-22-13.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to of- fending and victimization. Deviant Behavior, 29, 129–156. doi:10.1080/01639620701457816
Hinduja, S., & Patchin, J. W. (2010). Bullying, cy- berbullying, and suicide. Archives of Suicide Re- search, 14, 206–221. doi:10.1080/13811118.2010 .494133
Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41, S22–S30. doi:10.1016/j .jadohealth.2007.08.017
Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23, 1777–1791. doi:10.1016/j.chb.2005 .10.005
Olweus, D. (2012). Cyberbullying: An overrated phenomenon? European Journal of Developmen- tal Psychology, 9, 520 –538. doi:10.1080/ 17405629.2012.682358
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cy-
berbullying. Youth Violence and Juvenile Justice, 4, 148–169. doi:10.1177/1541204006286288
Rivers, I., & Noret, N. (2010). ‘I h 8 u’: Findings from a five-year study of text and email bullying. British Educational Research Journal, 36, 643– 671. doi:10.1080/01411920903071918
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385. doi:10.1111/j.1469-7610.2007.01846.x
Steffgen, G., Konig, A., Pfetsch, J., & Melzer, A. (2011). Are cyberbullies less empathic? Adoles- cents’ cyberbullying behavior and empathic re- sponsiveness. Cyberpsychology, Behavior, and So- cial Networking, 14, 643–648. doi:10.1089/cyber .2010.0445
Vandebosch, H., & Van Cleemput, K. (2008). Defin- ing cyberbullying: A qualitative research into the perceptions of youngsters. Cyberpsychology and Behavior, 11, 499 –503. doi:10.1089/cpb.2007 .0042
Ybarra, M. L., Diener-West, M., & Leaf, P. J. (2007). Examining the overlap in Internet harassment and school bullying: Implications for school interven- tion. Journal of Adolescent Health, 41, 42–50. doi: 10.1016/j.jadohealth.2007.09.004
Received October 31, 2012 Revision received June 17, 2013
Accepted July 2, 2013 �
10 BARLETT
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
Psychological Bulletin
Bullying in the Digital Age: A Critical Review and Meta-Analysis of Cyberbullying Research Among Youth Robin M. Kowalski, Gary W. Giumetti, Amber N. Schroeder, and Micah R. Lattanner Online First Publication, February 10, 2014. http://dx.doi.org/10.1037/a0035618
CITATION Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014, February 10). Bullying in the Digital Age: A Critical Review and Meta-Analysis of Cyberbullying Research Among Youth. Psychological Bulletin. Advance online publication. http://dx.doi.org/10.1037/a0035618
Bullying in the Digital Age: A Critical Review and Meta-Analysis of Cyberbullying Research Among Youth
Robin M. Kowalski Clemson University
Gary W. Giumetti Quinnipiac University
Amber N. Schroeder Western Kentucky University
Micah R. Lattanner Duke University
Although the Internet has transformed the way our world operates, it has also served as a venue for cyberbullying, a serious form of misbehavior among youth. With many of today’s youth experiencing acts of cyberbullying, a growing body of literature has begun to document the prevalence, predictors, and outcomes of this behavior, but the literature is highly fragmented and lacks theoretical focus. Therefore, our purpose in the present article is to provide a critical review of the existing cyberbullying research. The general aggression model is proposed as a useful theoretical framework from which to understand this phenomenon. Additionally, results from a meta-analytic review are presented to highlight the size of the relationships between cyberbullying and traditional bullying, as well as relationships between cyberbullying and other meaningful behavioral and psychological variables. Mixed effects meta-analysis results indicate that among the strongest associations with cyberbullying perpetration were normative beliefs about aggression and moral disengagement, and the strongest associations with cyberbullying victimization were stress and suicidal ideation. Several methodological and sample characteristics served as moderators of these relationships. Limitations of the meta-analysis include issues dealing with causality or directionality of these associations as well as generalizability for those meta-analytic estimates that are based on smaller sets of studies (k � 5). Finally, the present results uncover important areas for future research. We provide a relevant agenda, including the need for understanding the incremental impact of cyberbullying (over and above traditional bullying) on key behavioral and psychological outcomes.
Keywords: cyberbullying, bullying, perpetration, victimization, general aggression model
As more people turn to the Internet for school, work, and social use, so too do more people turn to the Internet to take out their frustrations and aggression. One form of cyber aggression has been gaining the attention of both researchers and the public in recent years: cyberbullying. Cyberbullying is typically defined as aggres- sion that is intentionally and repeatedly carried out in an electronic context (e.g., e-mail, blogs, instant messages, text messages) against a person who cannot easily defend him- or herself (Ko- walski, Limber, & Agatston, 2012; Patchin & Hinduja, 2012). Many researchers have noted that cyberbullying is occurring at widespread rates among youth and adults, with some studies showing nearly 75% of school-age children (Juvonen & Gross, 2008; Katzer, Fetchenhauer, & Belschak, 2009) experiencing this
form of aggression at least once in the last year. The experience of cyberbullying has been linked with a host of negative outcomes for both individuals and organizations (e.g., schools), including anx- iety, depression, substance abuse, difficulty sleeping, increased physical symptoms, decreased performance in school, absenteeism and truancy, dropping out of school, and murder or suicide (Beran & Li, 2005; Mitchell, Ybarra, & Finkelhor, 2007; Privitera & Campbell, 2009; Ybarra, Diener-West, & Leaf, 2007).
Our purpose in the current article is threefold: (a) to provide a narrative review of the extant research on cyberbullying among youth,1 including a look into the prevalence and antecedents of this behavior and associated outcomes; (b) to synthesize the relation- ships among cyberbullying, cybervictimization, and meaningful behavioral and psychological variables with meta-analytic tech- niques; and (c) to critique the existing research, noting areas where findings conflict and gaps remain, thereby allowing us to provide
1 Although research has been conducted on cyberbullying in the work- place, we focus on adolescents and young adults herein. First, the majority of the research under review has focused on this particular group of individuals. Second, because so little research has examined cyberbullying in the workplace, we do not know whether the predictors/consequences of cyberbullying are similar across the different samples.
Robin M. Kowalski, Department of Psychology, Clemson University; Gary W. Giumetti, Department of Psychology, Quinnipiac University; Amber N. Schroeder, Department of Psychology, Western Kentucky Uni- versity; Micah R. Lattanner, Department of Psychology and Neuroscience, Duke University.
Correspondence regarding this article should be addressed to Robin M. Kowalski, Department of Psychology, Clemson University, Clemson, SC 29634. E-mail: [email protected]
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
Psychological Bulletin © 2014 American Psychological Association 2014, Vol. 140, No. 2, 000 0033-2909/14/$12.00 DOI: 10.1037/a0035618
1
future researchers with directions where additional attention is needed.
Electronic Communication and the Importance of Studying Cyberbullying
There is no question that the Internet and related technologies have revolutionized the way that our world operates (Li, Smith, & Cross, 2012; Ybarra, Diener-West, & Leaf, 2007). The popularity of the Internet among school-age children and adolescents has become apparent to most, as nearly all youth between 12 and 17 use the Internet, and 68% of school pupils use the Internet at school (Hitlin & Rainie, 2005; Lenhart, 2010). Further, youth spend an average of about 17 hours per week on the Internet, with some spending more than 40 hours per week online (Center for Digital Future at the USC Annenberg School, 2010). Although most youth spend time communicating with their friends online, including forging new online friendships (Katzer et al., 2009), online interpersonal interactions can be particularly valuable for those who experience anxiety in face-to-face interactions.
Although the Internet has certainly provided many benefits, it may be responsible for a host of negative outcomes as well (Holfeld & Grabe, 2012). Among youth who venture online, almost a third report being contacted by someone they did not know through the Internet, and many report that this contact made them feel uncomfortable (Kowalski, Giumetti, Schroeder, & Re- ese, 2012). Other research has found a link between duration of Internet use and psychiatric symptoms, with those reporting more Internet use also experiencing more depression, obsessive compul- sion, and anxiety (Kelleci & Ìnal, 2010; Madden & Jones, 2008). The question of directionality with respect to this association clearly bears scrutiny, but the association appears robust. Further- more, the Internet has provided some with an avenue through which to commit various counterproductive behaviors, such as cyber-hacking (i.e., using the Internet to gain access to information or resources illegally), cyber-stalking (i.e., using the Internet to spy on or watch another person), and various forms of cyber aggres- sion including cyberbullying (i.e., using the Internet to harm an- other person; Kowalski, Limber, & Agatston, 2012). Additionally, some individuals may develop “pathological technology use” (PTU; Gentile, Coyne, & Bricolo, 2013). PTU refers to obsessive and addictive behaviors in response to technological media, such as the Internet or gaming, that resemble behaviors characteristic of addictions to alcohol or drugs.
Certain features of online communications, including reproduc- ibility, lack of emotional reactivity, perceived uncontrollability, relative permanence, and 24/7 accessibility, make it more likely for online misbehavior to occur (Kiesler, Siegel, & McGuire, 1984; Pearson, Andersson, & Porath, 2005). With regard to repro- ducibility, the core issue is that a person can easily copy all of his or her friends on a message or forward gossip to his or her entire address book. This reproducibility may make it easy for deviant individuals to harm others and to repeat the harm over and over again with the click of a button. Communications over the Internet also feature a lack of emotional reactivity. When people commu- nicate face-to-face, they provide many verbal and nonverbal cues about how they are feeling. For example, frowns or eyebrow raises are common nonverbal cues that are used when a conversation has upset the receiver. If such a cue is accurately perceived by the
message sender, the sender might soften his or her message or seek clarifying feedback. In an online context, communicators do not have this instant emotional reactivity, and they might more easily offend others in their communications (Kowalski, Giumetti, et al., 2012; Kowalski, Limber, & Agatston, 2012).
There is also a perception of uncontrollability on the Internet. Many modes of communicating online do not have a moderator to intervene if an interaction becomes aggressive, whereas in a face- to-face context, other people might be more likely to step in. Additionally, online communications, especially those on discus- sion boards or blogs, feature relative permanence because the messages can remain online indefinitely or until someone erases them, perhaps after downloading them. Finally, online communi- cations feature 24/7 accessibility that makes it possible to send and receive harmful messages at all hours of the day, which may make it seem as though one cannot escape (Kowalski, Limber, & Agat- ston, 2012). Each of these features might help to explain why cyberbullying is becoming more of a problem in today’s society.
Defining Cyberbullying
As noted earlier, most researchers agree that cyberbullying involves the use of electronic communication technologies to bully others. However, as will be seen, assessments of the prevalence of cyberbullying have proven difficult because there is a lack of consensus regarding the more specific parameters by which cy- berbullying should be defined (Olweus, 2013; P. K. Smith, del Barrio, & Tokunaga, 2012; Ybarra, Boyd, Korchmaros, & Oppen- heim, 2012). Table 1 presents an expansive although not exhaus- tive list of research in the field and reports on both the assessment methods and prevalence rates of cyberbullying across varying samples.2 As noted in the table, although there are commonalities across operational definitions, they differ in terms of specificity versus generality. Whereas some simply define cyberbullying as bullying that occurs via the Internet or mobile phones, others are more specific in terms of the taxonomy of technology, with clear implications for measurement, as discussed later.
Conceptualizing cyberbullying is compounded by the fact that cyberbullying can take so many different forms and occur through so many different venues. Willard (2007) has created a taxonomy of types of cyberbullying that includes flaming (i.e., an online fight), harassment (i.e., repetitive, offensive messages sent to a target), outing and trickery (i.e., soliciting personal information from someone and then electronically sharing that information with others without the individual’s consent), exclusion (i.e., blocking an individual from buddy lists), impersonation (i.e., pos- ing as the victim and electronically communicating negative or inappropriate information with others as if it were coming from the victim), cyber-stalking (i.e., using electronic communication to stalk another person by sending repetitive threatening communi- cations), and sexting (i.e., distributing nude pictures of another individual without that person’s consent).
The media through which cyberbullying can occur are equally diverse, including instant messaging, e-mail, text messages, web pages, chat rooms, social networking sites, digital images, and online games. Which of these media is the most frequently used
2 Table 1 includes only published, empirical studies in which cyberbul- lying was assessed.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
2 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
C yb
er bu
ll yi
ng P
re va
le nc
e E
st im
at es
an d
C ha
ra ct
er is
ti cs
of E
xi st
in g
St ud
ie s
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
A ga
ts to
n et
al .
(2 00
7) C
yb er
bu lly
in g
U si
ng th
e In
te rn
et or
ot he
r di
gi ta
l te
ch no
lo gi
es su
ch as
ce llu
la r
ph on
es an
d pe
rs on
al di
gi ta
l as
si st
an ts
to be
in te
nt io
na lly
m ea
n or
to ha
ra ss
ot he
rs
✓ L
if et
im e/
no ne
pr ov
id ed
14 8
12 –1
7 ye
ar s
So ut
he as
te rn
U .S
. —
— —
A kb
ul ut
& E
ri st
i (2
01 1)
C yb
er bu
lly in
g In
vo lv
em en
t in
fl am
in g,
ha ra
ss m
en t,
cy be
r- st
al ki
ng ,
de ni
gr at
io n,
m as
qu er
ad e,
ex cl
us io
n, ou
tin g,
an d
tr ic
ke ry
✓ a
L if
et im
e/ no
ne pr
ov id
ed 25
4 18
–2 3
ye ar
s T
ur ke
y 24
.1 –8
1. 1a
5. 5–
42 .8
a —
A lle
n (2
01 2)
C yb
er bu
lly in
g B
ul ly
[i ng
] or
ha ra
ss [m
en t]
by so
m eo
ne fr
om sc
ho ol
us in
g te
xt m
es sa
ge s
✓ ✓
Pa st
co up
le of
m on
th s
82 0
(s ur
ve y)
; 68
(i nt
er vi
ew s/
fo cu
s gr
ou ps
)
14 –1
9 ye
ar s
N or
th ea
st er
n U
.S .
3. 2
1. 0
—
A lm
ei da
et al
. (2
01 2)
C yb
er bu
lly in
g C
yb er
bu lly
in g
by m
ob ile
ph on
e an
d th
e In
te rn
et
✓ a
Pa st
co up
le of
m on
th s
1, 75
1 11
–2 0
ye ar
s Po
rt ug
al 5.
6– 6.
3a b
4. 3–
4. 4a
b 2.
5– 2.
6a b
A ng
& G
oh (2
01 0)
C yb
er bu
lly in
g C
yb er
bu lly
in g
be ha
vi or
in cl
ud [i
ng ]
br oa
dc as
tin g,
on lin
e ac
tio ns
ta rg
et ed
at th
e pe
rs on
, an
d de
ce pt
io n
✓ Si
nc e
th e
st ar
t of
sc ho
ol ye
ar (1
1 m
on th
s ea
rl ie
r)
39 6
12 –1
8 ye
ar s
Si ng
ap or
e —
18 .9
—
A ng
et al
. (2
01 1)
C yb
er bu
lly in
g C
yb er
bu lly
in g
be ha
vi or
in cl
ud [i
ng ]
br oa
dc as
tin g,
on lin
e ac
tio ns
ta rg
et ed
at th
e pe
rs on
, an
d de
ce pt
io n
✓ Si
nc e
th e
st ar
t of
sc ho
ol ye
ar (1
1 m
on th
s ea
rl ie
r)
71 0
M ea
n of
14 .6
ye ar
s
Si ng
ap or
e an
d M
al ay
si a
— —
—
A oy
am a,
B ar
na rd
-B ra
k, &
T al
be rt
(2 01
1)
C yb
er bu
lly in
g C
yb er
bu lly
in g
[v ia
] te
xt m
es sa
ge ,
e- m
ai l,
an d
[t he
] In
te rn
et ..
. in
cl ud
in g
na m
e- ca
lli ng
, so
ci al
ex cl
us io
n, [a
nd ]
ru m
or sp
re ad
in g
✓ L
as t
6 m
on th
s 13
3 G
ra de
s 9–
12 So
ut hw
es te
rn U
.S .
9. 8b
10 .5
b 12
.8 b
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
3CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
A oy
am a,
Sa xo
n, &
Fe ar
on (2
01 1)
C yb
er bu
lly in
g W
he n
an ot
he r
st ud
en t
or se
ve ra
l ot
he r
st ud
en ts
sa y
m ea
n an
d hu
rt fu
l th
in gs
or m
ak e
fu n
of hi
m or
he r
or ca
ll hi
m or
he r
m ea
n an
d hu
rt fu
l na
m es
vi a
e- m
ai l,
te xt
m es
sa ge
s, in
st an
t m
es sa
ge s
(I M
) an
d/ or
on lin
e; co
m pl
et el
y ig
no re
or ex
cl ud
e hi
m or
he r
fr om
th ei
r gr
ou p
of fr
ie nd
s or
le av
e hi
m or
he r
ou t
of th
in gs
on pu
rp os
e on
lin e;
te ll
lie s
or sp
re ad
fa ls
e ru
m or
s ab
ou t
hi m
or he
r to
tr y
to m
ak e
ot he
r st
ud en
ts di
sl ik
e hi
m or
he r
on lin
e; do
ot he
r hu
rt fu
l th
in gs
lik e
th at
on lin
e
✓ a
L as
t 3
m on
th s
46 3
M id
dl e
an d
hi gh
sc ho
ol
So ut
hw es
te rn
U .S
. 17
.1 –3
0. 7a
— —
A oy
am a
et al
. (2
01 2)
C yb
er bu
lly in
g Po
st [i
ng ]
na m
e- ca
lli ng
m es
sa ge
s to
In te
rn et
bu lle
tin bo
ar ds
or bl
og s
.. .
[o r]
be [i
ng ]
m ea
n to
so m
e pe
er s
us in
g th
e In
te rn
et (S
tu dy
1) ;
se nd
[i ng
] m
ea n
or na
st y
[e -m
ai l/t
ex t]
m es
sa ge
s to
so m
eo ne
.. .
[o r]
pu t[
tin g]
do w
n so
m eo
ne on
lin e
by se
nd in
g or
po st
in g
cr ue
l m
es sa
ge s,
go ss
ip ,
ru m
or s,
or ot
he r
ha rm
fu l
m at
er ia
ls (S
tu dy
2)
✓ a
L if
et im
e/ no
ne pr
ov id
ed (S
tu dy
1) ;
L as
t 6
m on
th s
(S tu
dy 2)
48 7
(S tu
dy 1)
; 27
5 (S
tu dy
2) 13
–1 5
ye ar
s (S
tu dy
1) ;
m ea
n of
16 .5
ye ar
s (S
tu dy
2)
Ja pa
n an
d so
ut hw
es te
rn U
.S .
7. 0b
(J ap
an ,
St ud
y 1)
; 11
.5 –2
4. 6a
(U .S
., St
ud y
2) ;
5. 0–
9. 4a
(J ap
an ,
St ud
y 2)
8. 0b
(J ap
an ,
St ud
y 1)
; 10
.3 –
21 .4
a
(U .S
., St
ud y
2) ;
4. 3–
5. 0a
(J ap
an ,
St ud
y 2)
18 .0
b (J
ap an
, St
ud y
1)
A ri
ca k
et al
. (2
00 8)
C yb
er bu
lly in
g C
yb er
bu lly
in g
on th
e In
te rn
et an
d vi
a ce
ll ph
on es
✓ L
if et
im e/
no ne
pr ov
id ed
26 9
12 –1
9 ye
ar s
T ur
ke y
5. 9b
35 .7
b 11
.9 b
B ar
le tt
& G
en til
e (2
01 2)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
as t
ye ar
49 3
(S tu
dy 1)
; 18
1 (S
tu dy
2) M
ea n
of 19
.4 ye
ar s
M id
w es
te rn
U .S
. —
— —
B au
m an
(2 01
0) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
C ur
re nt
sc ho
ol ye
ar 22
1 G
ra de
s 5–
8 So
ut hw
es te
rn U
.S .
3. 0b
1. 5b
8. 6b
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
4 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
B au
m an
& Pe
ro (2
01 0)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ Si
nc e
th e
st ar
t of
sc ho
ol ye
ar (3
m on
th s
ea rl
ie r)
52 G
ra de
s 7–
12 So
ut hw
es te
rn U
.S .
6. 0
(d ea
f) ;
0. 0
(h ea
ri ng
)b
0. 0
(d ea
f) ;
10 .0
(h ea
ri ng
)b
3. 0
(d ea
f) ;
5. 0
(h ea
ri ng
)b
B en
ne tt
et al
. (2
01 1)
E le
ct ro
ni c
ag gr
es si
on E
le ct
ro ni
c ho
st ili
ty ,
el ec
tr on
ic in
tr us
iv en
es s,
el ec
tr on
ic hu
m ili
at io
n, an
d el
ec tr
on ic
ex cl
us io
n
✓ L
as t
ye ar
43 7
18 –2
2 ye
ar s
U .S
. 92
.0 —
—
B er
an &
L i
(2 00
5) C
yb er
-h ar
as sm
en t/
cy be
rb ul
ly in
g W
he n
a st
ud en
t, or
se ve
ra l
st ud
en ts
, sa
ys m
ea n
an d
hu rt
fu l
th in
gs or
m ak
es fu
n of
an ot
he r
st ud
en t
or ca
lls hi
m or
he r
m ea
n an
d hu
rt fu
l na
m es
, co
m pl
et el
y ig
no re
s or
ex cl
ud es
hi m
or he
r fr
om th
ei r
gr ou
p of
fr ie
nd s
or le
av es
hi m
or he
r ou
t of
th in
gs on
pu rp
os e,
te lls
lie s
or sp
re ad
s fa
ls e
ru m
or s
ab ou
t hi
m or
he r,
se nd
s m
ea n
no te
s an
d tr
ie s
to m
ak e
ot he
r st
ud en
ts di
sl ik
e hi
m or
he r,
an d
ot he
r hu
rt fu
l th
in gs
lik e
th at
.. .
[t ha
t] ha
pp en
re pe
at ed
ly ,
an d
it is
di ff
ic ul
t fo
r th
e st
ud en
t be
in g
ha ra
ss ed
to de
fe nd
hi m
se lf
or he
rs el
f ..
. [a
nd ]
tw o
st ud
en ts
[a re
no t]
of ab
ou t
eq ua
l st
re ng
th or
po w
er
✓ L
if et
im e/
no ne
pr ov
id ed
43 2
12 –1
5 ye
ar s
C an
ad a
57 .7
25 .5
—
B er
an &
L i
(2 00
7) C
yb er
bu lly
in g
H ar
as si
ng be
ha vi
or s
in vo
lv in
g te
ch no
lo gy
✓ L
if et
im e/
no ne
pr ov
id ed
43 2
12 –1
5 ye
ar s
C an
ad a
57 .7
25 .5
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
5CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
B er
an et
al .
(2 01
2) C
yb er
-h ar
as sm
en t
R ep
ea te
dl y
do in
g on
e or
m or
e of
th e
fo llo
w in
g to
an ot
he r
pe rs
on fo
r w
ho m
it w
as di
ff ic
ul t
to de
fe nd
hi m
/h er
se lf
: (1
) sa
yi ng
m ea
n an
d hu
rt fu
l th
in gs
, te
as in
g, m
ak in
g fu
n, or
ca lli
ng hi
m /h
er m
ea n
an d
hu rt
fu l
na m
es ;
(2 )
ig no
ri ng
or ex
cl ud
in g
hi m
/ he
r; (3
) te
lli ng
lie s
or sp
re ad
in g
fa ls
e ru
m or
s ab
ou t
hi m
/h er
; or
(4 )
tr yi
ng to
m ak
e ot
he r
pe op
le di
sl ik
e hi
m /h
er ..
. us
[i ng
] te
ch no
lo gy
✓ L
if et
im e/
no ne
pr ov
id ed
1, 36
8 M
ea n
of 21
.1 ye
ar s
U .S
. an
d C
an ad
a 13
.8 (h
ig h
sc ho
ol );
8. 6
(c ol
le ge
)
8. 0
(h ig
h sc
ho ol
); 4.
1 (c
ol le
ge )
—
B er
so n
et al
. (2
00 2)
C yb
er -m
is co
nd uc
t T
he ex
ch an
ge of
su gg
es tiv
e or
th re
at en
in g
e m
ai l
m es
sa ge
s
✓ L
if et
im e/
no ne
pr ov
id ed
10 ,8
00 12
–1 8
ye ar
s O
nl in
e re
cr ui
tm en
t 15
.0 3.
0 —
B os
sl er
& H
ol t
(2 01
0) O
n- lin
e ha
ra ss
m en
t So
m eo
ne ha
ra ss
in g
yo u
in a
ch at
ro om
, In
te rn
et re
la y
ch at
, or
in st
an t
m es
sa gi
ng
✓ L
as t
ye ar
57 3
C ol
le ge
So ut
he as
te rn
U .S
. 18
.8 —
—
B ri
gh i,
G ua
ri ni
, et
al .
(2 01
2) C
yb er
bu lly
in g
B ul
ly [i
ng ]
vi a
a m
ob ile
ph on
e or
th e
In te
rn et
✓ L
as t
2 m
on th
s 2,
32 6
11 –2
1 ye
ar s
It al
y 12
.8 —
—
B ri
gh i,
M el
ot ti,
et al
. (2
01 2)
C yb
er bu
lly in
g B
ul ly
[i ng
] vi
a a
m ob
ile ph
on e
or th
e In
te rn
et
✓ L
if et
im e/
no ne
pr ov
id ed
5, 86
2 G
ra de
s 8,
10 ,
an d
12
It al
y, Sp
ai n,
an d
U ni
te d
K in
gd om
9. 9
— —
C al
ve te
et al
. (2
01 0)
C yb
er bu
lly in
g B
ul ly
[i ng
] vi
a th
e us
e of
th e
In te
rn et
an d
ce ll
ph on
es
✓ L
if et
im e/
no ne
pr ov
id ed
1, 43
1 12
–1 7
ye ar
s Sp
ai n
— 44
.1 —
C as
si dy
et al
. (2
01 2)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
if et
im e/
no ne
pr ov
id ed
17 N
ot re
po rt
ed C
an ad
a —
— —
C et
in et
al .
(2 01
2) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
L if
et im
e/ no
ne pr
ov id
ed 25
8 15
–1 8
ye ar
s T
ur ke
y —
— —
C et
in ,
Pe ke
r, et
al .
(2 01
1) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
L if
et im
e/ no
ne pr
ov id
ed 35
0 M
ea n
of 15
.2 ye
ar s
T ur
ke y
— —
—
Ç et
in ,
Y am
an ,
& Pe
ke r
(2 01
1) C
yb er
bu lly
in g
C yb
er fo
rg er
y, cy
be r
ve rb
al bu
lly in
g, [a
nd ]
hi di
ng id
en tit
y
✓ ✓
L if
et im
e/ no
ne pr
ov id
ed 40
4 14
–1 9
ye ar
s T
ur ke
y —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
6 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
C he
ng et
al .
(2 01
1) C
yb er
bu lly
in g
Sp re
ad in
g ru
m or
s on
lin e,
cr iti
ci zi
ng ot
he rs
on lin
e, an
d po
st in
g di
sg ra
ce fu
l ph
ot os
on lin
e w
ith ou
t pe
rm is
si on
✓ L
as t
6 m
on th
s 86
0 (s
ca le
de ve
lo pm
en t
st ag
e) ;
3, 94
1 (s
ca le
va lid
at io
n st
ag e)
12 –1
8 ye
ar s
C hi
na —
— —
C oy
ne et
al .
(2 00
9) G
ri ef
in g
In te
nt io
na l,
pe rs
is te
nt ,
un ac
ce pt
ab le
be ha
vi or
th at
di sr
up ts
a re
si de
nt ’s
ab ili
ty to
en jo
y Se
co nd
L if
e an
d w
hi ch
m ay
ha ve
ne ga
tiv e
co ns
eq ue
nc es
fo r
re si
de nt
s bo
th in
Se co
nd L
if e
an d
Fi rs
t (o
r R
ea l)
lif e.
M os
tly ,
th is
be ha
vi or
is di
re ct
ed at
a re
si de
nt w
ho ca
nn ot
ea si
ly de
fe nd
hi m
or he
rs el
f
✓ L
as t
ye ar
86 M
ea n
of 37
.1 ye
ar s
8 co
un tr
ie s
95 .0
20 .0
—
C ro
ss et
al .
(2 00
9) C
yb er
bu lly
in g
[B ul
ly in
g vi
a] In
te rn
et or
m ob
ile ph
on e
✓ C
ur re
nt sc
ho ol
te rm
7, 41
8 8–
14 ye
ar s
A us
tr al
ia 6.
6 3.
5 —
D ’A
nt on
a et
al .
(2 01
0) C
yb er
bu lly
in g
M ea
n or
hu rt
fu l
te xt
m es
sa ge
s ✓
L if
et im
e/ no
ne pr
ov id
ed 83
5 G
ra de
s 3–
5 N
or th
ea st
er n
U .S
. 6.
3 —
—
D eh
ue et
al .
(2 00
8) C
yb er
bu lly
in g
B ul
ly in
g on
th e
In te
rn et
or vi
a te
xt m
es sa
ge s
✓ C
ur re
nt sc
ho ol
ye ar
1, 21
1 M
ea n
of 12
.7 ye
ar s
N et
he rl
an ds
22 .9
17 .3
—
D eh
ue et
al .
(2 01
2) C
yb er
bu lly
in g
D oi
ng na
st y
an d
m ea
n th
in gs
to so
m eo
ne el
se us
in g
a co
m pu
te r
or ce
ll ph
on e
.. .
[w ith
a] la
ck of
po w
er on
th e
pa rt
of th
e vi
ct im
, ..
. an
on ym
ity of
th e
bu lly
, an
d th
e ex
cl us
io n
of jo
ke s
✓ C
ur re
nt sc
ho ol
ye ar
1, 18
4 10
–1 4
ye ar
s N
et he
rl an
ds 13
.8 b
7. 7b
8. 2b
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
7CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
D em
ps ey
et al
. (2
01 1)
C yb
er -a
gg re
ss io
n Se
nd [i
ng ]
a st
ud en
t a
te xt
m es
sa ge
or in
st an
t m
es sa
ge th
at w
as m
ea n
or th
at th
re at
en ed
th at
st ud
en t;
po st
[i ng
] a
co m
m en
t on
a st
ud en
t’ s
w eb
sp ac
e w
al l
th at
w as
m ea
n or
th at
th re
at en
ed th
at st
ud en
t; se
nd [i
ng ]
a st
ud en
t an
e- m
ai l
th at
w as
m ea
n or
th at
th re
at en
ed th
at st
ud en
t; cr
ea t[
in g]
a w
eb pa
ge ab
ou t
a st
ud en
t th
at ha
d m
ea n
or em
ba rr
as si
ng in
fo rm
at io
n an
d/ or
ph ot
os
✓ L
as t
30 da
ys 1,
67 2
G ra
de s
6– 8
So ut
he as
te rn
U .S
. —
10 .0
—
D em
ps ey
et al
. (2
00 9)
C yb
er vi ct
im iz
at io
n Pe
er ag
gr es
si on
in vo
lv in
g in
st an
t m
es sa
gi ng
, te
xt m
es sa
gi ng
, pe
rs on
al iz
ed w
eb si
te s,
w eb
po st
s, an
d e-
m ai
l
✓ L
as t
30 da
ys 1,
68 4
11 –1
6 ye
ar s
So ut
he rn
U .S
. 14
.0 —
—
D id
de n
et al
. (2
00 9)
C yb
er bu
lly in
g B
ul ly
in g
.. .
vi a
In te
rn et
an d
ce ll
ph on
e
✓ a
L as
t 3
m on
th s
11 4
12 –1
9 ye
ar s
N et
he rl
an ds
4. 0–
7. 0a
b 0.
0– 4.
0a b
3. 0–
5. 0a
b
D ilm
ac (2
00 9)
C yb
er bu
lly in
g T
he us
e of
in fo
rm at
io n
an d
co m
m un
ic at
io n
te ch
no lo
gi es
to su
pp or
t de
lib er
at e,
re pe
at ed
, an
d ho
st ile
be ha
vi or
by an
in di
vi du
al or
gr ou
p, th
at is
in te
nd ed
to ha
rm ot
he rs
✓ L
if et
im e/
no ne
pr ov
id ed
66 6
18 –2
2 ye
ar s
T ur
ke y
35 .7
b 3.
0b 19
.5 b
D oo
le ye
t al
. (2
01 0)
C yb
er bu
lly in
g B
ul ly
[i ng
] vi
a th
e In
te rn
et or
m ob
ile ph
on e
✓ L
as t
3 m
on th
s (A
us tr
al ia
); la
st 2
m on
th s
(A us
tr ia
)
7, 48
9 10
–1 5
ye ar
s A
us tr
al ia
an d
A us
tr ia
— —
—
D oo
le ye
t al
. (2
01 2)
C yb
er bu
lly in
g B
ul ly
in g
vi a
th e
In te
rn et
or m
ob ile
ph on
e
✓ M
os t
re ce
nt sc
ho ol
te rm
51 6
10 –1
6 ye
ar s
A us
tr al
ia —
— —
E rd
ur -B
ak er
(2 01
0) C
yb er
bu lly
in g
B ul
ly in
g vi
a th
e In
te rn
et or
ce ll
ph on
e
✓ L
as t
se m
es te
r 27
6 14
–1 8
ye ar
s T
ur ke
y —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
8 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
E rd
ur -B
ak er
& K
av şu
t (2
00 7)
C yb
er bu
lly in
g B
ul ly
in g
vi a
th e
In te
rn et
or ce
ll ph
on e
✓ a
L if
et im
e/ no
ne pr
ov id
ed 22
8 14
–1 9
ye ar
s T
ur ke
y 3.
1– 30
.1 a
4. 4–
28 .3
a —
E rd
ur -B
ak er
& T
an ri
ku lu
(2 01
0)
C yb
er bu
lly in
g B
ul ly
in g
vi a
th e
In te
rn et
or ce
ll ph
on e
✓ Pa
st se
m es
te r
16 5
10 –1
4 ye
ar s
T ur
ke y
— —
—
E re
nt ai
tė et
al .
(2 01
2) C
yb er
bu lly
in g
B ul
ly [i
ng ]
vi a
ce ll
ph on
e (s
ho rt
m es
sa ge
s (S
M S)
, cl
ip s/
pi ct
ur es
an d
ca lls
) [o
r] vi
a e-
m ai
l, ch
at ,
in st
an t
m es
sa gi
ng (I
M ),
an d
w eb
si te
s
✓ L
as t
fe w
m on
th s
1, 66
7 15
–1 9
ye ar
s L
ith ua
ni a
29 .3
— —
E st
év ez
et al
. (2
01 0)
C yb
er bu
lly in
g B
ul ly
in g
vi a
th e
In te
rn et
, ce
ll ph
on es
, ph
ot os
, or
vi de
os
✓ L
if et
im e/
no ne
pr ov
id ed
1, 43
1 12
–1 7
ye ar
s Sp
ai n
7. 4b
25 .0
b 22
.8 b
Fa nt
i et
al .
(2 01
2) C
yb er
bu lly
in g
Se nd
[i ng
] ..
. a
th re
at en
in g
or ha
ra ss
in g
e- m
ai l,
in st
an t
m es
sa ge
, m
es sa
ge in
a ch
at ro
om or
so ci
al ne
tw or
ki ng
si te
s, an
d sh
or t
te xt
m es
sa ge
(S M
S)
✓ L
if et
im e/
no ne
pr ov
id ed
1, 41
6 11
–1 4
ye ar
s C
yp ru
s —
— —
Fi nn
(2 00
4) O
nl in
e ha
ra ss
m en
t R
ep ea
te d
us e
of e-
m ai
l an
d in
st an
t m
es sa
gi ng
to in
su lt,
ha ra
ss ,
th re
at en
, or
se nd
in ap
pr op
ri at
e m
at er
ia l
su ch
as po
rn og
ra ph
y
✓ a
D ur
in g
te nu
re at
cu rr
en t
un iv
er si
ty
33 9
M ea
n of
20 .3
ye ar
s
N or
th ea
st er
n U
.S .
9. 6–
58 .7
a —
—
Fl em
in g
et al
. (2
00 6)
O nl
in e
bu lly
in g
E xp
os ur
e to
bu lly
in g
[o nl
in e]
✓ L
if et
im e/
no ne
pr ov
id ed
69 2
13 –1
6 ye
ar s
A us
tr al
ia 36
.8 —
—
Fr ed
st ro
m et
al .
(2 01
1) E
le ct
ro ni
c vi
ct im
iz at
io n
B ul
ly in
g [v
ia ]
e- m
ai lin
g, ch
at ro
om in
g, te
xt m
es sa
gi ng
, ph
on e
ca lli
ng ,
on lin
e po
st in
g, or
pi ct
ur e/
vi de
o cl
ip
✓ L
as t
ye ar
80 2
G ra
de 9
So ut
he as
te rn
U .S
. 27
.1 —
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
9CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
G oe
be rt
et al
. (2
01 1)
C yb
er bu
lly in
g R
ec ei
v[ in
g] a
th re
at en
in g
or m
ea n
te xt
m es
sa ge
; re
ce iv
[i ng
] a
th re
at en
in g
or m
ea n
e- m
ai l;
ha v[
in g]
em ba
rr as
si ng
, th
re at
en in
g or
m ea
n in
fo rm
at io
n po
st ed
ab ou
t th
em on
a w
eb si
te ;
ha v[
in g]
a da
tin g
pa rt
ne r
go th
ro ug
h th
ei r
ce ll
ph on
e to
ch ec
k on
ca lls
or te
xt m
es sa
ge s;
an d
ha v[
in g]
a pa
rt ne
r go
th ro
ug h
th ei
r pe
rs on
al w
eb si
te to
ch ec
k up
on th
em
✓ L
as t
ye ar
67 7
G ra
de s
9– 12
H aw
ai i
56 .1
— —
G ra
di ng
er ,
St ro
hm ei
er ,
Sc hi
lle r,
et al
. (2
01 2)
C yb
er -
vi ct
im iz
at io
n B
e[ in
g] in
su lte
d or
hu rt
by re
ce iv
in g
m ea
n ca
lls ,
te xt
m es
sa ge
s, e-
m ai
ls ,
ch at
co nt
ri bu
tio ns
, di
sc us
si on
bo ar
d co
nt ri
bu tio
ns ,
in st
an t
m es
sa ge
s, vi
de os
or ph
ot os
✓ L
as t
2 m
on th
s 66
5 M
ea n
of 11
.6 ye
ar s
A us
tr ia
— —
—
G ra
di ng
er et
al .
(2 00
9) C
yb er
bu lly
in g
O ft
en us
[i ng
] th
e m
ob ile
ph on
e or
th e
co m
pu te
r to
se nd
m ea
n te
xt m
es sa
ge s,
e- m
ai ls
, vi
de os
, or
ph ot
os to
ot he
rs
✓ L
if et
im e/
no ne
pr ov
id ed
76 1
14 –1
9 ye
ar s
A us
tr ia
7. 1
5. 3
—
G ra
di ng
er ,
St ro
hm ei
er ,
& Sp
ie l
(2 01
2)
C yb
er bu
lly in
g In
su lt[
in g]
or hu
rt [i
ng ]
ot he
r st
ud en
ts by
se nd
in g
m ea
n te
xt m
es sa
ge s,
e- m
ai ls
, vi
de os
, or
ph ot
os to
th em
✓ L
as t
2 m
on th
s 1,
46 1
10 –1
5 ye
ar s
A us
tr ia
10 .4
6. 9
—
H ay
& M
el dr
um (2
01 0)
C yb
er bu
lly in
g [B
ei ng
] th
e ta
rg et
of “m
ea n”
te xt
m es
sa ge
s; se
nt th
re at
en in
g or
hu rt
fu l
st at
em en
ts or
pi ct
ur es
in an
e- m
ai l
or te
xt m
es sa
ge ;
an d
m ad
e fu
n of
on th
e In
te rn
et
✓ L
as t
ye ar
42 6
10 –2
1 ye
ar s
So ut
he as
te rn
U .S
. —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
10 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
H ay
, M
el dr
um ,
& M
an n
(2 01
0)
C yb
er bu
lly in
g [B
ei ng
] th
e ta
rg et
of “m
ea n”
te xt
m es
sa ge
s; se
nt th
re at
en in
g or
hu rt
fu l
st at
em en
ts or
pi ct
ur es
in an
e- m
ai l
or te
xt m
es sa
ge ;
an d
m ad
e fu
n of
on th
e In
te rn
et
✓ L
as t
ye ar
42 4
M ea
n of
15 .0
ye ar
s
So ut
he as
te rn
U .S
. —
— —
H em
ph ill
et al
. (2
01 2)
C yb
er bu
lly in
g B
ul ly
[i ng
] an
ot he
r st
ud en
t us
in g
te ch
no lo
gy ,
su ch
as m
ob ile
te le
ph on
es ,
th e
In te
rn et
, co
m pu
te rs
, an
sw er
in g
m ac
hi ne
s, or
ca m
er as
✓ L
as t
ye ar
69 6
11 –1
4 ye
ar s
(t im
e 1)
; 14
–1 6
ye ar
s (t
im e
2)
A us
tr al
ia —
15 .0
—
H in
du ja
& Pa
tc hi
n (2
00 7)
C yb
er bu
lly in
g [B
ei ng
] ig
no re
d by
ot he
rs ,
di sr
es pe
ct ed
by ot
he rs
, ca
lle d
na m
es ,
th re
at en
ed ,
m ad
e fu
n of
by ot
he rs
, pi
ck ed
on by
ot he
rs ,
sc ar
ed fo
r sa
fe ty
, an
d [h
av in
g] ru
m or
s sp
re ad
by ot
he rs
✓ L
if et
im e/
no ne
pr ov
id ed
1, 38
8 6–
17 ye
ar s
O nl
in e
re cr
ui tm
en t
34 .4
— —
H in
du ja
& Pa
tc hi
n (2
00 8)
C yb
er bu
lly in
g B
ot he
ri ng
so m
eo ne
on lin
e, te
as in
g in
a m
ea n
w ay
, ca
lli ng
so m
eo ne
hu rt
fu l
na m
es ,
in te
nt io
na lly
le av
in g
pe rs
on s
ou t
of th
in gs
, th
re at
en in
g so
m eo
ne ,
an d
sa yi
ng un
w an
te d
se xu
al ly
-r el
at ed
th in
gs to
so m
eo ne
✓ L
as t
6 m
on th
s 1,
37 8
� 18
ye ar
s O
nl in
e re
cr ui
tm en
t 34
.6 16
.8 —
H in
du ja
& Pa
tc hi
n (2
01 0)
C yb
er bu
lly in
g O
nl in
e ag
gr es
si on
[v ia
] co
m pu
te r
te xt
m es
sa ge
s, M
yS pa
ce or
si m
ila r
si te
[s ],
e- m
ai l,
in st
an t
m es
sa ge
[s ],
ch at
ro om
[s ],
or ot
he r
w eb
pa ge
s
✓ L
as t
30 da
ys 1,
96 3
10 –1
6 ye
ar s
U .S
. 29
.4 21
.8 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
11CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
H ol
fe ld
& G
ra be
(2 01
2) C
yb er
bu lly
in g
T he
in te
nt io
na l
an d
re pe
at ed
ha rm
of ot
he rs
th ro
ug h
th e
us e
of co
m pu
te rs
, ce
ll ph
on es
, an
d ot
he r
el ec
tr on
ic de
vi ce
s
✓ L
if et
im e/
no ne
pr ov
id ed
, la
st ye
ar ,
an d
la st
30 da
ys
38 3
M ea
n of
13 .5
ye ar
s
N or
th er
n U
.S .
17 .0 (l
if et
im e)
; 16
.0 (l
as t
ye ar
)
11 .0 (l
if et
im e)
; 9.
0 (l
as t
ye ar
)
—
H ua
ng &
C ho
u (2
01 0)
C yb
er bu
lly in
g Il
l- in
te nd
ed be
ha vi
or s
in cy
be rs
pa ce
(i .e
., e-
m ai
ls ,
in st
an t
m es
se ng
er s,
ch at
ro om
s, on
lin e
po lls
, w
eb fo
ru m
s, w
eb lo
gs ,
an d
ce ll-
ph on
e te
xt m
es sa
ge s)
[t ha
t] in
cl ud
e th
re at
s, ha
ra ss
m en
t, hu
m ili
at io
n, in
su lts
, an
d an
y ot
he r
em ot
io na
l pu
t- do
w ns
by m
ea ns
of w
or ks
, fa
ke pi
ct ur
es ,
pe ep
in g-
T om
vi de
os ,
or an
y co
m bi
na tio
n of
di gi
ta l
co nt
en t
✓ L
if et
im e/
no ne
pr ov
id ed
54 5
G ra
de s
7– 9
T ai
w an
34 .9
20 .4
—
H un
t et
al .
(2 01
2) C
yb er
bu lly
in g
O th
er ki
ds sa
y[ in
g] na
st y
th in
gs to
m e
by SM
S, th
re at
en [i
ng ]
m e
ov er
th e
ph on
e, se
nd [i
ng ]
m e
na st
y e-
m ai
ls ,
ha ra
ss [i
ng ]
m e
ov er
th e
ph on
e, sa
y[ in
g] na
st y
th in
gs ab
ou t
m e
on w
eb si
te s,
se nd
[i ng
] m
e co
m pu
te r
vi ru
se s
on pu
rp os
e, sa
y[ in
g] na
st y
th in
gs ab
ou t
m e
on an
in st
an t
m es
se ng
er or
ch at
ro om
, an
d m
ak [i
ng ]
pr an
k ca
lls to
m e
✓ L
if et
im e/
no ne
pr ov
id ed
94 3
8– 16
ye ar
s A
us tr
al ia
— —
—
Jo se
et al
. (2
01 2)
C yb
er bu
lly in
g Se
nd [i
ng ]
a m
ea n
te xt
m es
sa ge
to so
m eo
ne [o
r] bu
lly [i
ng ]
ot he
rs on
lin e
✓ L
as t
m on
th 1,
77 4
11 –1
6 ye
ar s
N ew
Z ea
la nd
— —
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
12 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Ju vo
ne n
& G
ro ss
(2 00
8) C
yb er
bu lly
in g
A ny
th in
g th
at so
m eo
ne do
es th
at up
se ts
or of
fe nd
s so
m eo
ne el
se ,
in cl
ud in
g na
m e-
ca lli
ng ,
th re
at s,
se nd
in g
em ba
rr as
si ng
/ pr
iv at
e pi
ct ur
es ,
an d
sh ar
in g
pr iv
at e
in fo
rm at
io n
w ith
ou t
pe rm
is si
on ..
. vi
a e-
m ai
l, in
st an
t m
es sa
gi ng
, ce
ll ph
on e
te xt
m es
sa gi
ng ,
in a
ch at
ro om
, bl
og ,
pe rs
on al
pr of
ile si
te ,
an d/
or m
es sa
ge bo
ar ds
✓ L
as t
ye ar
1, 45
4 12
–1 7
ye ar
s O
nl in
e re
cr ui
tm en
t 72
.0 —
—
K at
ze r
et al
. (2
00 9)
C yb
er bu
lly in
g B
ul ly
in g
in In
te rn
et ch
at ro
om s
✓ a
L if
et im
e/ no
ne pr
ov id
ed 1,
70 0
M ea
n of
14 .1
ye ar
s
G er
m an
y 4.
3– 44
.0 a
— —
K es
se l
Sc hn
ei de
r et
al .
(2 01
2) C
yb er
bu lly
in g
U s[
in g]
th e
In te
rn et
, a
ph on
e, or
ot he
r el
ec tr
on ic
co m
m un
ic at
io ns
to bu
lly ,
te as
e, or
th re
at en
yo u
✓ L
as t
ye ar
20 ,4
06 G
ra de
s 9–
12 N
or th
ea st
er n
U .S
. 15
.8 —
—
K ite
et al
. (2
01 0)
C yb
er bu
lly in
g B
ul ly
in g
be ha
vi or
on bo
th M
yS pa
ce an
d in
st an
t m
es se
ng er
si te
s
✓ a
L if
et im
e/ no
ne pr
ov id
ed 58
8 G
ra de
s 7–
8 N
or th
ea st
er n
U .S
. 10
.0 6.
0– 10
.0 a
—
K lo
m ek
et al
. (2
00 8)
C yb
er bu
lly in
g U
s[ in
g] e-
m ai
l or
In te
rn et
to be
m ea
n to
yo u
✓ L
as t
4 w
ee ks
2, 34
1 13
–1 9
ye ar
s N
or th
ea st
er n
U .S
. 7.
3 —
—
K ön
ig et
al .
(2 01
0) C
yb er
bu lly
in g
Fl am
in g,
ha ra
ss m
en t,
de ni
gr at
io n,
im pe
rs on
at io
n, ou
tin g/
tr ic
ke ry
, ex
cl us
io n
an d
cy be
r- st
al ki
ng
✓ L
as t
6 m
on th
s 47
3 11
–1 7
ye ar
s O
nl in
e re
cr ui
tm en
t (G
er m
an fo
ru m
)
— 79
.3 —
K ow
al sk
i &
Fe di
na (2
01 1)
C yb
er bu
lly in
g B
ul ly
[i ng
] th
ro ug
h e-
m ai
l, in
st an
t m
es sa
gi ng
, in
a ch
at ro
om ,
on a
w eb
si te
, or
th ro
ug h
a te
xt m
es sa
ge se
nt to
a ce
ll ph
on e
✓ c
Pa st
co up
le of
m on
th s
42 10
–2 0
ye ar
s U
.S .
21 .4
5. 8
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
13CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
K ow
al sk
i &
L im
be r
(2 00
7)
E le
ct ro
ni c
bu lly
in g
B ul
ly [i
ng ]
th ro
ug h
e- m
ai l,
in st
an t
m es
sa gi
ng ,
in a
ch at
ro om
, on
a w
eb si
te ,
or th
ro ug
h a
te xt
m es
sa ge
se nt
to a
ce ll
ph on
e
✓ c
Pa st
co up
le of
m on
th s
3, 76
7 G
ra de
s 6–
8 So
ut he
as te
rn an
d no
rt hw
es te
rn U
.S .
11 .1
b 4.
1b 6.
8b
K ow
al sk
i &
L im
be r
(2 01
3)
C yb
er bu
lly in
g B
ul ly
[i ng
] th
ro ug
h e-
m ai
l, in
st an
t m
es sa
gi ng
, in
a ch
at ro
om ,
on a
w eb
si te
, or
th ro
ug h
a te
xt m
es sa
ge se
nt to
a ce
ll ph
on e
✓ c
Pa st
co up
le of
m on
th s
93 1
11 –1
9 ye
ar s
N or
th ea
st er
n U
.S .
14 .2
b 16
.8 b
18 .6
b
K ow
al sk
i, M
or ga
n, &
L im
be r
(2 01
2)
C yb
er bu
lly in
g B
ul ly
[i ng
] th
ro ug
h e-
m ai
l, in
st an
t m
es sa
gi ng
, in
a ch
at ro
om ,
on a
w eb
pa ge
, or
th ro
ug h
a te
xt m
es sa
ge se
nt to
a ce
ll ph
on e
✓ Pa
st co
up le
of m
on th
s 4,
53 1
11 –1
9 ye
ar s
U .S
. 10
.9 b
4. 5b
6. 4b
L am
& L
i (2
01 3)
E -B
ul ly
in g
T ea
s[ in
g] ,
ca ll[
in g]
so m
eo ne
ba d
na m
es ,
sa y[
in g]
m ea
n th
in gs
ab ou
t so
m eo
ne ,
sa y[
in g]
yo u
ar e
go in
g to
hi t/h
ur t
so m
eo ne
, th
re at
en [i
ng ]
so m
eo ne
, [o
r] m
ak [i
ng ]
up so
m et
hi ng
ab ou
t so
m eo
ne to
m ak
e ot
he rs
no t
lik e
hi m
/h er
an ym
or e
us in
g e-
m ai
ls ,
te xt
in g,
sh or
t m
es sa
ge s,
on a
w eb
si te
su ch
as R
en re
n, et
c.
✓ L
as t
7 da
ys 48
4 11
–1 6
ye ar
s C
hi na
— —
—
L aw
, Sh
ap ka
, D
om en
e, &
G ag
né (2
01 2)
C yb
er bu
lly in
g/ on
lin e
ag gr
es si
on
M ea
n th
in gs
, ru
m or
s, or
go ss
ip be
in g
sa id
th ro
ug h
th e
In te
rn et
w eb
si te
s, e-
m ai
l, or
te xt
m es
sa gi
ng an
d ..
. em
ba rr
as si
ng pi
ct ur
es or
vi de
o cl
ip s
of yo
ur se
lf or
pe op
le yo
u kn
ow be
in g
se nt
or po
st ed
on th
e In
te rn
et
✓ ✓
L if
et im
e/ no
ne pr
ov id
ed 73
3 10
–1 8
ye ar
s C
an ad
a —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
14 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
L aw
, Sh
ap ka
, H
ym el
, et
al .
(2 01
2)
C yb
er bu
lly in
g M
ea n
th in
gs ,
ru m
or s,
or go
ss ip
be in
g sa
id th
ro ug
h th
e In
te rn
et w
eb si
te s,
e- m
ai l,
or te
xt m
es sa
gi ng
an d
.. .
em ba
rr as
si ng
pi ct
ur es
or vi
de o
cl ip
s of
yo ur
se lf
or pe
op le
yo u
kn ow
be in
g se
nt or
po st
ed on
th e
In te
rn et
✓ L
if et
im e/
no ne
pr ov
id ed
17 ,5
51 1
14 –1
8 ye
ar sd
C an
ad a
8. 0
6. 0
—
L en
ha rt
(2 00
7) C
yb er
bu lly
in g
R ec
ei vi
ng th
re at
en in
g m
es sa
ge s;
ha vi
ng ..
. pr
iv at
e e-
m ai
ls or
te xt
m es
sa ge
s fo
rw ar
de d
w ith
ou t
co ns
en t;
ha vi
ng an
em ba
rr as
si ng
pi ct
ur e
po st
ed w
ith ou
t pe
rm is
si on
; or
ha vi
ng ru
m or
s ..
. sp
re ad
on lin
e
✓ L
if et
im e/
no ne
pr ov
id ed
93 5
12 –1
7 ye
ar s
U .S
. 32
.0 —
—
L es
te r
et al
. (2
01 2)
C yb
er bu
lly in
g M
ea n
an d
hu rt
fu l
te xt
(S M
S) m
es sa
ge s
(t ex
t m
es sa
ge s,
pi ct
ur es
or vi
de o
cl ip
s) an
d m
ea n
an d
hu rt
fu l
m es
sa ge
s on
th e
In te
rn et
(e -m
ai l;
pi ct
ur es
, w
eb ca
m or
vi de
o cl
ip s;
ch at
ro om
s; M
SN m
es se
ng er
or an
ot he
r fo
rm of
in st
an t
m es
se ng
er ;
so ci
al ne
tw or
ki ng
si te
s lik
e M
yS pa
ce ;
In te
rn et
ga m
e; w
eb lo
g/ bl
og or
w eb
pa ge
/w eb
si te
)
✓ Pr
ev io
us sc
ho ol
te rm
1, 78
2 M
ea n
of 12
(t im
e 1)
; m
ea n
of 14
(T im
e 2)
A us
tr al
ia —
— —
L i
(2 00
6) C
yb er
bu lly
in g
C yb
er bu
lly in
g [v
ia ]
e- m
ai l,
ch at
ro om
, ce
ll ph
on e
✓ c
L if
et im
e/ no
ne pr
ov id
ed 26
4 G
ra de
s 7–
9 C
an ad
a 16
.9 25
.3 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
15CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
L i
(2 00
7a )
C yb
er bu
lly in
g H
ar as
si ng
us in
g te
ch no
lo gy
su ch
as e-
m ai
l, co
m pu
te r,
ce ll
ph on
e, vi
de o
ca m
er as
, et
c. [t
ha t]
oc cu
rs w
he n
pe op
le sa
y m
ea n
an d
hu rt
fu l
th in
gs or
m ak
e fu
n of
an ot
he r
pe rs
on or
ca lls
hi m
/h er
m ea
n an
d hu
rt fu
l na
m es
, co
m pl
et el
y ig
no re
or ex
cl ud
e hi
m /
he r
fr om
th ei
r gr
ou p
of fr
ie nd
s or
le av
es hi
m /h
er ou
t of
th in
gs on
pu rp
os e,
te lls
lie s
or sp
re ad
s fa
ls e
ru m
or s
ab ou
t hi
m /h
er ,
se nd
s m
ea n
no te
s an
d tr
ie s
to m
ak e
ot he
r st
ud en
ts di
sl ik
e hi
m /h
er ,
an d
ot he
r hu
rt fu
l th
in gs
lik e
th at
.. .
[a nd
] it
is di
ff ic
ul t
fo r
th e
pe rs
on be
in g
bu lli
ed to
de fe
nd hi
m se
lf or
he rs
el f
.. .
[a nd
] tw
o pe
op le
[a re
no t]
of ab
ou t
eq ua
l st
re ng
th or
po w
er
✓ c
L if
et im
e/ no
ne pr
ov id
ed 46
1 G
ra de
7 C
an ad
a an
d C
hi na
28 .9
17 .8
—
L i
(2 00
7b )
C yb
er bu
lly in
g C
yb er
bu lly
in g
[v ia
] e-
m ai
l, ch
at ro
om ,
ce ll
ph on
e
✓ c
L if
et im
e/ no
ne pr
ov id
ed 17
7 G
ra de
7 C
an ad
a 24
.9 14
.5 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
16 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
L i
(2 00
8) C
yb er
bu lly
in g
H ar
as si
ng us
in g
te ch
no lo
gy su
ch as
e- m
ai l,
co m
pu te
r, ce
ll ph
on e,
vi de
o ca
m er
as ,
et c.
[t ha
t] oc
cu rs
w he
n pe
op le
sa y
m ea
n an
d hu
rt fu
l th
in gs
or m
ak e
fu n
of an
ot he
r pe
rs on
or ca
lls hi
m /h
er m
ea n
an d
hu rt
fu l
na m
es ,
co m
pl et
el y
ig no
re or
ex cl
ud e
hi m
/ he
r fr
om th
ei r
gr ou
p of
fr ie
nd s
or le
av es
hi m
/h er
ou t
of th
in gs
on pu
rp os
e, te
lls lie
s or
sp re
ad s
fa ls
e ru
m or
s ab
ou t
hi m
/h er
, se
nd s
m ea
n no
te s
an d
tr ie
s to
m ak
e ot
he r
st ud
en ts
di sl
ik e
hi m
/h er
, an
d ot
he r
hu rt
fu l
th in
gs lik
e th
at ..
. [a
nd ]
it is
di ff
ic ul
t fo
r th
e pe
rs on
be in
g bu
lli ed
to de
fe nd
hi m
se lf
or he
rs el
f ..
. [a
nd ]
tw o
pe op
le [a
re no
t] of
ab ou
t eq
ua l
st re
ng th
or po
w er
✓ c
L if
et im
e/ no
ne pr
ov id
ed 35
4 11
–1 5
ye ar
s C
an ad
a an
d C
hi na
29 .5
10 .5
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
17CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
L i
(2 01
0) C
yb er
bu lly
in g
In cl
ud es
bu t
is no
t lim
ite d
to se
nd in
g an
gr y,
ru de
, vu
lg ar
m es
sa ge
s ab
ou t
a pe
rs on
to an
on lin
e gr
ou p
or to
th at
pe rs
on el
ec tr
on ic
al ly
; or
se nd
in g
ha rm
fu l,
un tr
ue ,
or cr
ue l
st at
em en
ts ab
ou t
a pe
rs on
to ot
he r
pe op
le or
po st
in g
su ch
m at
er ia
l on
lin e;
or pr
et en
di ng
to be
so m
eo ne
el se
an d
se nd
in g
or po
st in
g m
at er
ia l
th at
m ak
es th
at pe
rs on
lo ok
ba d;
or se
nd in
g or
po st
in g
m at
er ia
l ab
ou t
a pe
rs on
th at
co nt
ai ns
se ns
iti ve
, pr
iv at
e, or
em ba
rr as
si ng
in fo
rm at
io n,
in cl
ud in
g fo
rw ar
di ng
pr iv
at e
m es
sa ge
s or
im ag
es ,
or cr
ue lly
ex cl
ud in
g so
m eo
ne fr
om an
on lin
e gr
ou p
.. .
[t ha
t] m
ig ht
oc cu
r at
ho m
e or
at sc
ho ol
, th
ro ug
h th
e In
te rn
et ne
tw or
k or
a ce
ll ph
on e
✓ L
if et
im e/
no ne
pr ov
id ed
26 9
G ra
de s
7– 12
C an
ad a
— —
—
M ac
D on
al d
& R
ob er
ts -
Pi ttm
an (2
01 0)
C yb
er bu
lly in
g Se
nd in
g or
po st
in g
ha rm
fu l
or cr
ue l
te xt
or im
ag es
us in
g th
e In
te rn
et or
ot he
r di
gi ta
l co
m m
un ic
at io
n de
vi ce
s (d
ir ec
t qu
ot e
fr om
W ill
ar d,
20 07
)
✓ c
Si nc
e st
ar tin
g co
lle ge
43 9
M ea
n of
23 .0
ye ar
s
M id
w es
te rn
U .S
. 21
.9 8.
6 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
18 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
M ac
hm ut
ow et
al .
(2 01
2) C
yb er
- vi
ct im
is at
io n
[C yb
er bu
lly in
g be
ha vi
or ]
in vo
lv in
g on
ly th
e bu
lly an
d th
e vi
ct im
(i .e
., te
xt m
es sa
ge s,
M SN
, Fa
ce bo
ok ,
N et
lo g,
et c.
); in
vo lv
in g
co nt
en t
(m es
sa ge
, pi
ct ur
e or
vi de
o) ..
. se
nt to
gr ou
ps of
pe op
le ;
or in
vo lv
in g
co nt
en t
.. .
po st
ed on
th e
In te
rn et
✓ L
as t
4 m
on th
s 76
5 M
ea n
of 13
.2 Sw
itz er
la nd
— —
—
M ar
sh et
al .
(2 01
0) T
ex t
bu lly
in g
[B ul
ly in
g vi
a] te
xt in
g ✓
C ur
re nt
sc ho
ol ye
ar 1,
16 9
M ea
n of
15 .7
N ew
Z ea
la nd
11 .0
7. 0
—
M el
an de
r (2
01 0)
C yb
er ha
ra ss
m en
t M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ n/
a 39
18 –2
3 ye
ar s
M id
w es
te rn
U .S
. —
— —
M en
es in
i et
al .
(2 01
2) C
yb er
bu lly
in g
N as
ty te
xt m
es sa
ge s;
ph on
e pi
ct ur
es /
ph ot
os or
vi de
oc lip
s of
vi ol
en t
sc en
es ;
ph on
e pi
ct ur
es /
ph ot
os or
vi de
oc lip
s of
in tim
at e
sc en
es ;
si le
nt /p
ra nk
ph on
e ca
lls ;
na st
y or
ru de
e- m
ai ls
; in
su lts
on w
eb si
te s;
in su
lts on
in st
an t
m es
sa gi
ng ;
in su
lts in
a ch
at ro
om ;
in su
lts on
a bl
og ;
an d
un pl
ea sa
nt pi
ct ur
es /p
ho to
s on
w eb
si te
s
✓ a
Pa st
co up
le of
m on
th s
70 7
11 –2
1 ye
ar s
It al
y 3.
9– 44
.5 a
2. 7–
36 .6
a —
M en
es in
i, N
oc en
tin i,
& C
al us
si (2
01 1)
C yb
er bu
lly in
g N
as ty
te xt
m es
sa ge
s; ph
on e
pi ct
ur es
/ ph
ot os
/v id
eo of
vi ol
en t
sc en
es ;
ph on
e pi
ct ur
es /
ph ot
os /v
id eo
of in
tim at
e sc
en es
; si
le nt
/p ra
nk ph
on e
ca lls
; na
st y
or ru
de e-
m ai
ls ;
in su
lts on
w eb
si te
s; in
su lts
on in
st an
t m
es sa
gi ng
; in
su lts
in ch
at ro
om s;
in su
lts on
bl og
s; un
pl ea
sa nt
pi ct
ur es
/p ho
to s
on w
eb si
te s
✓ a
L as
t 2
m on
th s
1, 09
2 11
–1 8
ye ar
s It
al y
4. 5–
47 .1
a 0.
0– 38
.5 a
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
19CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
M en
es in
i, N
oc en
tin i,
& C
am od
ec a
(2 01
3)
C yb
er bu
lly in
g N
as ty
te xt
m es
sa ge
s; ph
on e
pi ct
ur es
/ ph
ot os
/v id
eo s
of in
tim at
e sc
en es
; in
su lts
on w
eb si
te s;
in su
lts on
in st
an t
m es
sa gi
ng ;
in su
lts in
a ch
at ro
om s;
[a nd
] in
su lts
on bl
og
✓ L
as t
2 m
on th
s 39
0 14
–1 8
ye ar
s It
al y
— —
—
M es
ch (2
00 9)
C yb
er bu
lly in
g So
m eo
ne sp
re ad
in g
ru m
or s
on lin
e ab
ou t
yo u;
so m
eo ne
po st
in g
an em
ba rr
as si
ng pi
ct ur
e on
lin e
w ith
ou t
yo ur
pe rm
is si
on ;
so m
eo ne
se nd
in g
a th
re at
en in
g e-
m ai
l, in
st an
t m
es sa
ge ,
or te
xt to
yo u;
so m
eo ne
ta ki
ng a
pr iv
at e
e- m
ai l,
in st
an t
m es
sa ge
, or
te xt
m es
sa ge
yo u
se nt
th em
an d
fo rw
ar di
ng it
to so
m eo
ne el
se or
po st
in g
it; an
d ha
vi ng
be en
co nt
ac te
d by
a st
ra ng
er
✓ L
if et
im e/
no ne
pr ov
id ed
93 5
12 –1
7 ye
ar s
U .S
. 40
.0 —
—
M is
hn a
et al
. (2
01 0)
C yb
er bu
lly in
g T
he us
e of
e- m
ai l,
ce ll
ph on
es ,
te xt
m es
sa ge
s, an
d In
te rn
et si
te s
to be
m ea
n to
, m
ak e
fu n
of ,
or sc
ar e
pe op
le
✓ L
as t
3 m
on th
s 2,
18 6
G ra
de s
6, 7,
10 ,
an d
11
C an
ad a
49 .5
33 .7
—
M is
hn a
et al
. (2
01 2)
C yb
er bu
lly in
g C
al lin
g so
m eo
ne na
m es
; th
re at
en in
g; sp
re ad
in g
ru m
or s;
se nd
in g
a pr
iv at
e pi
ct ur
e w
ith ou
t co
ns en
t; pr
et en
di ng
to be
so m
eo ne
el se
; re
ce iv
in g
or se
nd in
g un
w an
te d
se xu
al te
xt or
ph ot
os ;
or be
in g
as ke
d to
do so
m et
hi ng
se xu
al
✓ L
as t
3 m
on th
s 2,
18 6
G ra
de s
6, 7,
10 ,
an d
11
C an
ad a
23 .8
b 8.
0b 25
.7 b
M is
hn a
et al
. (2
00 9)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
if et
im e/
no ne
pr ov
id ed
38 G
ra de
s 5–
8 C
an ad
a —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
20 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
M itc
he ll
et al
. (2
01 1)
O nl
in e
vi ct
im iz
at io
n U
s[ in
g] th
e In
te rn
et to
bo th
er or
ha ra
ss ..
. or
to sp
re ad
m ea
n w
or ds
or pi
ct ur
es ..
. an
d [t
o] as
k ..
. se
xu al
qu es
tio ns
.. .
or tr
y to
ge t
yo u
to ta
lk on
lin e
ab ou
t se
x w
he n
yo u
di d
no t
w an
t to
ta lk
ab ou
t th
os e
th in
gs
✓ L
if et
im e/
no ne
pr ov
id ed
an d
la st
ye ar
2, 05
1 10
–1 7
ye ar
s U
.S .
6. 0
(p as
t ye
ar );
9. 0
(l if
et im
e)
— —
M on
ks et
al .
(2 01
2) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
L as
t sc
ho ol
te rm
22 0
7– 11
ye ar
s E
ng la
nd 20
.5 5.
0 —
M .
M oo
re et
al .
(2 01
2) C
yb er
bu lly
in g
A gg
re ss
iv e
fo ru
m po
st s
(i .e
., ve
rb al
in su
lts or
at ta
ck s
di re
ct ed
at an
in di
vi du
al or
so m
eo ne
as so
ci at
ed w
ith th
e in
di vi
du al
)
✓ n/
a 26
— N
ot re
po rt
ed —
— —
P. M
oo re
et al
. (2
01 2)
E le
ct ro
ni c
bu lly
in g
B ul
ly in
g th
ro ug
h e-
m ai
l, in
st an
t m
es sa
gi ng
, in
a ch
at ro
om ,
on a
w eb
si te
, or
th ro
ug h
a te
xt m
es sa
ge se
nt to
a ce
ll ph
on e
✓ Pa
st co
up le
of m
on th
s 85
5 M
ea n
of 13
.0 ye
ar s
So ut
he as
te rn
U .S
. 20
.5 13
.9 —
N at
io na
l C
hi ld
re ns
H om
e &
T es
co M
ob ile
(2 00
5)
T ex
t bu
lly in
g B
ul ly
in g
or th
re at
vi a
e- m
ai l,
In te
rn et
ch at
ro om
, or
te xt
✓ L
if et
im e/
no ne
pr ov
id ed
77 0
11 –1
9 ye
ar s
U ni
te d
K in
gd om
20 .0
11 .0
—
N av
ar ro
et al
. (2
01 3)
C yb
er bu
lly in
g C
yb er
bu lly
in g
(a s
de fi
ne d
by T
ok un
ag a,
20 10
) [v
ia ]
th e
In te
rn et
✓ L
as t
6 m
on th
s 1,
06 8
10 –1
2 ye
ar s
Sp ai
n 24
.6 —
—
N av
ar ro
et al
. (2
01 2)
C yb
er bu
lly in
g C
yb er
bu lly
in g
(a s
de fi
ne d
by T
ok un
ag a,
20 10
) [v
ia ]
th e
In te
rn et
✓ L
as t
6 m
on th
s 1,
12 7
10 –1
2 ye
ar s
Sp ai
n 24
.2 —
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
21CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
O ’M
oo re
(2 01
2) C
yb er
bu lly
in g
B ul
ly in
g th
ro ug
h te
xt m
es sa
ge s,
pi ct
ur es
or vi
de o
cl ip
s vi
a m
ob ile
ph on
e ca
m er
as ,
ph on
e ca
lls ,
e- m
ai l,
ch at
ro om
s, in
st an
t m
es sa
gi ng
(I M
) or
w eb
si te
s (b
lo gs
, pe
rs on
al w
eb si
te s,
pe rs
on al
po lli
ng si
te s,
or so
ci al
ne tw
or ki
ng si
te s)
.. .
[t ha
t] ca
n ha
pp en
w he
n te
xt m
es sa
ge s/
pi ct
ur es
/c lip
s/ e-
m ai
ls /m
es sa
ge s
et c.
.. .
ar e
se nt
to yo
u, bu
t al
so w
he n
te xt
m es
sa ge
s/ pi
ct ur
es /c
lip s/
e- m
ai ls
/m es
sa ge
s et
c. ar
e se
nt to
ot he
rs ,
ab ou
t yo
u
✓ Pa
st co
up le
of m
on th
s 3,
00 4
12 –1
6 ye
ar s
Ir el
an d
9. 8b
4. 4b
4. 1b
O rt
eg a,
E lip
e, &
C al
m ae
st ra
(2 00
9)
C yb
er bu
lly in
g A
ty pe
of nu
is an
ce or
ha ra
ss m
en t
th at
us es
te ch
no lo
gi ca
l m
ea ns
to m
es s
w ith
so m
eo ne
, su
ch as
th e
ph on
e or
th e
In te
rn et
e
✓ c
L as
t 2
m on
th s
83 0
12 –1
8 ye
ar s
Sp ai
n 5.
1b 8.
4b 8.
6b
O rt
eg a,
E lip
e, M
or a-
M er
ch án
, et
al .
(2 00
9)
C yb
er bu
lly in
g In
vo lv
es th
e us
e of
m ob
ile ph
on es
(t ex
ts ,
ca lls
, vi
de o
cl ip
s) or
th e
In te
rn et
(e -m
ai l,
in st
an t
m es
sa gi
ng ,
ch at
ro om
s, an
d w
eb si
te s)
or ot
he r
fo rm
s of
IC T
to de
lib er
at el
y ha
ra ss
, th
re at
en ,
or in
tim id
at e
so m
eo ne
✓ L
as t
2 m
on th
s 1,
67 1
12 –1
7 ye
ar s
Sp ai
n 5.
0 —
—
Pa rr
is et
al .
(2 01
2) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
L if
et im
e/ no
ne pr
ov id
ed 20
15 –1
9 ye
ar s
So ut
he as
te rn
U .S
. —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
22 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Pa tc
hi n
& H
in du
ja (2
00 6)
C yb
er bu
lly in
g B
eh av
io r
th at
ca n
in cl
ud e
bo th
er in
g so
m eo
ne on
lin e,
te as
in g
in a
m ea
n w
ay ,
ca lli
ng so
m eo
ne hu
rt fu
l na
m es
, in
te nt
io na
lly le
av in
g pe
rs on
s ou
t of
th in
gs ,
th re
at en
in g
so m
eo ne
, an
d sa
yi ng
un w
an te
d, se
xu al
ly re
la te
d th
in gs
to so
m eo
ne [o
nl in
e]
✓ c
L as
t 30
da ys
38 4
9– 17
ye ar
s O
nl in
e re
cr ui
tm en
t 29
.4 10
.7 8.
0
Pa tc
hi n
& H
in du
ja (2
01 0)
C yb
er bu
lly in
g R
ec ei
v[ in
g] an
up se
tti ng
e- m
ai l
fr om
so m
eo ne
yo u
kn ow
; re
ce iv
[i ng
] an
in st
an t
m es
sa ge
th at
m ad
e yo
u up
se t;
ha v[
in g]
so m
et hi
ng po
se d
on yo
ur M
yS pa
ce th
at m
ad e
yo u
up se
t; be
[i ng
] m
ad e
fu n
of in
a ch
at ro
om ;
re ce
iv [i
ng ]
an up
se tti
ng e-
m ai
l fr
om so
m eo
ne yo
u di
d no
t kn
ow (n
ot sp
am );
ha v[
in g]
so m
et hi
ng po
st ed
ab ou
t yo
u on
an ot
he r
W eb
pa ge
th at
m ad
e yo
u up
se t;
so m
et hi
ng ha
s be
en po
st ed
ab ou
t yo
u on
lin e
th at
yo u
di d
no t
w an
t ot
he rs
to se
e; be
[i ng
] pi
ck ed
on or
bu lli
ed on
lin e;
be [i
ng ]
af ra
id to
go on
th e
co m
pu te
r
✓ L
as t
30 da
ys 1,
96 3
10 –1
6 ye
ar s
U .S
. 29
.4 21
.8 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
23CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Pa tc
hi n
& H
in du
ja (2
01 1)
C yb
er bu
lly in
g Po
st [i
ng ]
so m
et hi
ng on
lin e
ab ou
t an
ot he
r pe
rs on
to m
ak e
ot he
rs la
ug h;
se nd
[i ng
] so
m eo
ne a
co m
pu te
r te
xt m
es sa
ge to
m ak
e th
em an
gr y
or to
m ak
e fu
n of
th em
; ha
v[ in
g] ta
ke n
a pi
ct ur
e of
so m
eo ne
an d
po st
ed it
on lin
e w
ith ou
t th
ei r
pe rm
is si
on ;
po st
[i ng
] so
m et
hi ng
on M
yS pa
ce or
si m
ila r
si te
to m
ak e
th em
an gr
y or
to m
ak e
fu n
of th
em ;
se nd
[i ng
] so
m eo
ne an
e- m
ai l
to m
ak e
th em
an gr
y or
to m
ak e
fu n
of th
em
✓ L
as t
30 da
ys 1,
96 3
10 –1
6 ye
ar s
U .S
. —
21 .5
—
Pa ul
et al
. (2
01 2)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
if et
im e/
no ne
pr ov
id ed
30 M
ea n
of 11
.9 ye
ar s
E ng
la nd
— —
—
Pe rg
ol iz
zi et
al .
(2 00
9) C
yb er
bu lly
in g
T he
us e
of th
e In
te rn
et ,
ce ll
ph on
es an
d ot
he r
te ch
no lo
gi es
to bu
lly ,
ha ra
ss ,
th re
at en
, or
em ba
rr as
s so
m eo
ne
✓ L
if et
im e/
no ne
pr ov
id ed
58 7
G ra
de s
7– 8
M ul
tip le
re gi
on s
of U
.S .
27 .9
15 .2
—
Pe rr
en et
al .
(2 01
0) C
yb er
bu lly
in g
Se nd
[i ng
] na
st y
or th
re at
en in
g e-
m ai
ls ,
na st
y m
es sa
ge s
on th
e In
te rn
et /to
m ob
ile ph
on e
an d
m ea
n or
na st
y co
m m
en ts
or pi
ct ur
es se
nt to
w eb
si te
s/ ot
he r
st ud
en ts
’ m
ob ile
ph on
es
✓ L
as t
3 m
on th
s 1,
69 4
M ea
n of
13 .8
ye ar
s
Sw itz
er la
nd an
d A
us tr
al ia
— —
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
24 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Pe rr
en &
G ut
zw ill
er -
H el
fe nf
in ge
r (2
01 2)
C yb
er bu
lly in
g Se
nd [i
ng ]
na st
y or
th re
at en
in g
e- m
ai ls
; na
st y
m es
sa ge
s on
th e
In te
rn et
/to m
ob ile
ph on
e; an
d m
ea n
or na
st y
co m
m en
ts or
pi ct
ur es
se nt
to w
eb si
te s/
ot he
r st
ud en
ts ’
m ob
ile ph
on es
✓ L
as t
3 m
on th
s 56
4 12
–1 9
ye ar
s O
nl in
e re
cr ui
tm en
t (G
er m
an so
ci al
ne tw
or ki
ng si
te )
— —
—
Po po
vi c-
C iti
c et
al .
(2 01
1) C
yb er
bu lly
in g
H ar
as sm
en t
(i .e
., re
pe at
ed ly
se nd
in g
of fe
ns iv
e, ru
de ,
an d
in su
lti ng
m es
sa ge
s th
ro ug
h ch
at ro
om s,
e- m
ai ls
, te
xt m
es sa
gi ng
or an
y ot
he r
on lin
e fo
rm of
co m
m un
ic at
io n)
, de
ni gr
at io
n (i
.e .,
se nd
in g
or po
st in
g cr
ue l
ru m
or s
ab ou
t a
pe rs
on in
or de
r to
da m
ag e
hi s
or he
r re
pu ta
tio n
or fr
ie nd
sh ip
s) ,
an d
ou tin
g (i
.e .,
ha ri
ng so
m eo
ne ’s
se cr
et or
em ba
rr as
si ng
in fo
rm at
io n
on lin
e)
✓ a
Si nc
e th
e st
ar t
of sc
ho ol
ye ar
(n o
in fo
rm at
io n
pr ov
id ed
on tim
e el
ap se
d in
sc ho
ol ye
ar )
38 7
11 –1
5 ye
ar s
Se rb
ia 19
.4 –2
5. 6a
8. 5–
11 .6
a —
Po rn
ar i
& W
oo d
(2 01
0) C
yb er
ag gr
es si
on [A
gg re
ss io
n vi
a] te
xt m
es sa
ge s,
e- m
ai ls
, [a
nd ]
In te
rn et
ch at
ro om
s/ fo
ru m
s
✓ L
as t
6 m
on th
s 33
9 M
ea n
of 13
.3 ye
ar s
U ni
te d
K in
gd om
56 .2
31 .5
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
25CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Pu re
& M
et zg
er (2
01 2)
C yb
er bu
lly in
g/ on
lin e
ag gr
es si
on
B ul
ly [i
ng ]
.. .
th ro
ug h
te xt
m es
sa gi
ng ,
pi ct
ur es
/p ho
to s
or vi
de o
cl ip
s, ph
on e
ca lls
, e-
m ai
ls ,
ch at
ro om
s, in
st an
t m
es sa
gi ng
, [a
nd ]
w eb
si te
s (i
nc lu
di ng
bl og
s, vi
de o
si te
s lik
e Y
ou T
ub e,
an d
so ci
al ne
tw or
ki ng
si te
s lik
e Fa
ce bo
ok )
.. .
se nt
to yo
u ..
. [o
r] se
nt to
ot he
rs ,
ab ou
t yo
u
✓ L
if et
im e/
no ne
pr ov
id ed
38 0
18 –3
4 ye
ar s
W es
te rn
U .S
. 18
.7 —
—
R as
ka us
ka s
(2 01
0) C
yb er
bu lly
in g
B ul
ly [i
ng ]
by te
xt m
es sa
ge s
✓ Si
nc e
th e
st ar
t of
sc ho
ol ye
ar (5
–6 m
on th
s ea
rl ie
r)
1, 53
0 11
–1 8
ye ar
s N
ew Z
ea la
nd 43
.0 —
—
R as
ka us
ka s
& St
ol tz
(2 00
7) E
le ct
ro ni
c bu
lly in
g E
le ct
ro ni
c bu
lly in
g [v
ia ]
te xt
m es
sa ge
s, w
eb si
te s
or ch
at ro
om s,
an d
ta ki
ng or
di st
ri bu
tin g
so m
eo ne
’s pi
ct ur
e w
ith ou
t pe
rm is
si on
✓ C
ur re
nt sc
ho ol
ye ar
an d
la st
30 da
ys
84 13
–1 8
ye ar
s L
oc at
io n
un sp
ec if
ie d
48 .8
21 .4
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
26 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
R ie
be l
et al
. (2
00 9)
C yb
er bu
lly in
g H
ar as
sm en
t (i
.e .,
se nd
[i ng
] th
re at
en in
g, in
su lti
ng or
ot he
r di
sc om
fo rt
in g
m es
sa ge
s in
th e
In te
rn et
or on
yo ur
ce ll
ph on
e) ,
de ni
gr at
io n
(i .e
., sp
re ad
[i ng
] ru
m or
s or
in su
lts ..
. th
ro ug
ho ut
th e
In te
rn et
or on
ot he
r pe
op le
’s ce
ll ph
on es
), ou
tin g
an d
tr ic
ke ry
(i .e
., pa
ss [i
ng ]
on pr
iv at
e e-
m ai
ls ,
ch at
m es
sa ge
s or
pi ct
ur es
.. .,
in or
de r
to ex
po se
[s om
eo ne
], an
d ex
cl us
io n
(i .e
., ex
cl ud
[i ng
] ..
. [s
om eo
ne ]
fr om
ch at
s or
on lin
e ga
m es
)
✓ L
as t
2 m
on th
s 1,
98 7
6– 19
ye ar
s O
nl in
e an
d m
ag az
in e
re cr
ui tm
en t
(b ot
h G
er m
an -
ba se
d)
5. 4
4. 0
—
R iv
er s
& N
or et
(2 01
0) C
yb er
bu lly
in g
N as
ty or
th re
at en
in g
te xt
m es
sa ge
s or
e- m
ai ls
✓ ✓
C ur
re nt
sc ho
ol te
rm
A pp
ro xi
m at
el y
2, 50
0 pe
r ye
ar 11
–1 3
ye ar
s E
ng la
nd 13
.0 –1
6. 4
(a cr
os s
5 ye
ar s)
— —
Şa hi
n (2
01 2)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
if et
im e/
no ne
pr ov
id ed
38 9
Se co
nd ar
y sc
ho ol
T ur
ke y
— —
—
Şa hi
n et
al .
(2 01
0) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
L if
et im
e/ no
ne pr
ov id
ed 30
0 Se
co nd
ar y
sc ho
ol T
ur ke
y —
— —
Sa ke
lla ri
ou et
al .
(2 01
2) C
yb er
bu lly
in g
T hr
ea te
ni ng
or hu
rt fu
l e-
m ai
ls ,
SM S
m es
sa ge
s, im
ag es
vi a
th e
In te
rn et
or m
ob ile
ca m
er a
ph on
e, or
m es
sa ge
s vi
a th
e In
te rn
et se
nt ..
. by
ot he
r st
ud et
ns
✓ a
L if
et im
e/ no
ne pr
ov id
ed 1,
53 0
9– 18
ye ar
s A
us tr
al ia
4. 8–
11 .5
a 4.
2– 11
.5 a
V
Sa lm
iv al
li &
Pö yh
ön en
(2 01
2)
C yb
er bu
lly in
g Se
nd [i
ng ]
m ea
n or
hu rt
fu l
m es
sa ge
s, ca
lls ,
or pi
ct ur
es ..
. by
ce ll
ph on
e or
th ro
ug h
th e
In te
rn et
✓ Pa
st co
up le
of m
on th
s 17
,6 27
8– 15
ye ar
s Fi
nl an
d 2.
0 1.
0 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
27CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Sb ar
ba ro
& E
ny ea
rt Sm
ith (2
01 1)
C yb
er bu
lly in
g Po
st [i
ng ]
m ea
n or
hu rt
fu l
co m
m en
ts ..
. on
lin e,
po st
[i ng
] a
m ea
n or
hu rt
fu l
pi ct
ur e
on lin
e, po
st [i
ng ]
a m
ea n
or hu
rt fu
l vi
de o
on lin
e, cr
ea t[
in g]
a m
ea n
or hu
rt fu
l w
eb pa
ge ,
sp re
ad [i
ng ]
ru m
or s
.. .
on lin
e, th
re at
en [i
ng ]
to hu
rt ..
. [s
om eo
ne ]
th ro
ug h
a ce
ll ph
on e
te xt
m es
sa ge
, th
re at
en [i
ng ]
to hu
rt ..
. [s
om eo
ne ]
on lin
e, [a
nd ]
pr et
en d[
in g]
to be
.. .
[s om
eo ne
] on
lin e
an d
ac t[
in g]
in a
w ay
th at
w as
m ea
n or
hu rt
fu l
✓ c
L if
et im
e/ no
ne pr
ov id
ed an
d la
st 30
da ys
10 6
G ra
de s
7– 9
So ut
hw es
te rn
U .S
. 34
.0 (l if
et im
e) ;
11 .3
(l as
t 30
da ys
)
43 .4 (l
if et
im e)
; 17
.9 (l
as t
30 da
ys )
—
Sc he
nk &
Fr em
ou w
(2 01
2)
C yb
er bu
lly in
g C
yb er
bu lly
in g
[v ia
] te
xt m
es sa
gi ng
, In
te rn
et ,
pi ct
ur e/
vi de
o m
es sa
gi ng
, ph
on e
ca lls
, an
d m
as qu
er ad
in g
✓ c
Si nc
e st
ar tin
g co
lle ge
79 9
18 –2
4 ye
ar s
So ut
he as
te rn
U .S
. 8.
6 —
—
Sc ho
ff st
al l
& C
oh en
(2 01
1) C
yb er
ag gr
es si
on [B
ei ng
] m
ea n
to so
m eo
ne us
in g
e- m
ai ls
, ch
at ro
om s,
an d
so ci
al ne
tw or
ki ng
si te
s
✓ a
L if
et im
e/ no
ne pr
ov id
ed 19
2 8–
12 ye
ar s
L oc
at io
n un
sp ec
if ie
d —
15 .1
–2 2.
9a —
Sc hu
ltz e-
K ru
m bh
ol z
& Sc
he ith
au er
(2 00
9b )
C yb
er bu
lly in
g B
ul ly
in g
us in
g e-
m ai
l, m
ob ile
ph on
es ,
an d
In te
rn et
in ge
ne ra
l
✓ L
if et
im e/
no ne
pr ov
id ed
71 M
ea n
of 14
.1 ye
ar s
G er
m an
y 15
.5 16
.9 9.
9
Se ng
up ta
& C
ha ud
hu ri
(2 01
1)
C yb
er bu
lly in
g R
um or
sp re
ad in
g, re
ce iv
in g
th re
at s,
em ba
rr as
si ng
in fo
rm at
io n
po st
ed ab
ou t
th em
, an
d fo
rw ar
di ng
pr iv
at e
m es
sa ge
s
✓ L
if et
im e/
no ne
pr ov
id ed
93 5
12 –1
7 ye
ar s
U .S
. �
25 .0
— —
Še vč
ík ov
á &
Šm ah
el (2
00 9)
O nl
in e
ha ra
ss m
en t
[B ei
ng ]
m oc
ke d,
hu m
ili at
ed ,
[h ar
as se
d, ]
or hu
rt on
th e
In te
rn et
✓ L
if et
im e/
no ne
pr ov
id ed
2, 21
5 12
–8 8
ye ar
s C
ze ch R ep
ub lic
10 .1
b 0.
9b 4.
8b
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
28 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Še vč
ík ov
á et
al .
(2 01
2) C
yb er
bu lly
in g
B eh
av io
r w
he re
th e
ag gr
es so
r( s)
ab us
es th
e In
te rn
et to
ca rr
y ou
t in
te nt
io na
l, re
pe tit
iv e
an d
ho st
ile ha
rm to
ot he
rs
✓ L
if et
im e/
no ne
pr ov
id ed
16 15
–1 7
ye ar
s O
nl in
e re
cr ui
tm en
t (C
ze ch
R ep
ub lic
- ba
se d
si te
)
— —
—
Sl on
je et
al .
(2 01
2) C
yb er
bu lly
in g
B ul
ly in
g th
ro ug
h el
ec tr
on ic
m ea
ns su
ch as
: m
ob ile
ph on
e ca
lls ,
te xt
m es
sa gi
ng ,
pi ct
ur e/
vi de
o cl
ip ,
e- m
ai l,
ch at
ro om
s, w
eb si
te s
an d
in st
an t
m es
sa gi
ng
✓ c
L as
t 2–
3 m
on th
s 75
9 9–
16 ye
ar s
Sw ed
en 10
.6 9.
6 —
P. K
. Sm
ith et
al .
(2 00
8) C
yb er
bu lly
in g
C yb
er bu
lly in
g th
ro ug
h te
xt m
es sa
gi ng
; pi
ct ur
es /p
ho to
s or
vi de
o cl
ip s;
ph on
e ca
lls ;
e- m
ai l;
ch at
ro om
s; in
st an
t m
es sa
gi ng
; an
d w
eb si
te s
✓ Pa
st co
up le
of m
on th
s 92
(S tu
dy 1)
; 53
3 (S
tu dy
2) 11
–1 6
ye ar
s E
ng la
nd 22
.2 (S
tu dy
1) ;
17 .3
(S tu
dy 2)
12 .4
(S tu
dy 2)
—
Sn el
l &
E ng
la nd
er (2
01 0)
C yb
er bu
lly in
g B
ul ly
in g
vi a
th e
In te
rn et
or te
xt m
es sa
ge s
✓ L
if et
im e/
no ne
pr ov
id ed
21 3
C ol
le ge
N or
th ea
st er
n U
.S .
A pp
ro xi
m at
el y
10 .0
–4 1.
0a —
—
So ur
an de
r et
al .
(2 01
0) C
yb er
bu lly
in g
W he
n so
m eo
ne re
pe at
ed ly
pi ck
s on
an ot
he r
pe rs
on th
ro ug
h e-
m ai
l or
te xt
m es
sa ge
s or
w he
n so
m eo
ne po
st s
so m
et hi
ng on
lin e
ab ou
t an
ot he
r pe
rs on
th ey
do n’
t lik
e
✓ c
L as
t 6
m on
th s
2, 21
5 13
–1 6
ye ar
s Fi
nl an
d 4.
8b 7.
4b 5.
4b
Sp ea
rs et
al .
(2 00
9) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
L if
et im
e/ no
ne pr
ov id
ed 20
12 –1
8 ye
ar s
A us
tr al
ia —
— —
St au
de -M
ül le
r et
al .
(2 01
2) O
nl in
e vi
ct im
iz at
io n
H ar
as sm
en t,
se xu
al ha
ra ss
m en
t, fl
am in
g, cy
be r-
st al
ki ng
, de
ni gr
at io
n, im
pe rs
on at
io n,
ou tin
g an
d tr
ic ke
ry ,
an d
ex cl
us io
n
✓ a
L if
et im
e/ no
ne pr
ov id
ed 9,
76 0
10 –5
0 ye
ar s
O nl
in e
re cr
ui tm
en t
(G er
m an
- ba
se d
si te
)
22 .1
–8 1.
5a —
—
St ef
fg en
et al
. (2
01 1)
C yb
er bu
lly in
g [C
yb er
bu lly
in g
vi a]
te xt
m es
sa ge
, pi
ct ur
e/ vi
de o
cl ip
, ph
on e
ca ll,
e- m
ai l,
w eb
si te
s/ ch
at ro
om ,
or in
st an
t m
es sa
gi ng
✓ c
C ur
re nt
sc ho
ol ye
ar 2,
07 0
12 –2
4 ye
ar s
L ux
em bo
ur g
3. 0b
3. 6b
1. 4b
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
29CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
St ro
hm ei
er et
al .
(2 01
1) C
yb er
- vi
ct im
iz at
io n
B ul
ly [i
ng ]
by ce
ll ph
on e
or th
ro ug
h th
e In
te rn
et ..
. [b
y] re
ce iv
[i ng
] m
ea n
or hu
rt fu
l m
es sa
ge s,
ca lls
, or
pi ct
ur es
✓ Pa
st co
up le
of m
on th
s 4,
95 7
9– 12
ye ar
s Fi
nl an
d —
— —
Su m
te r
et al
. (2
01 2)
O nl
in e
vi ct
im iz
at io
n H
ar as
sm en
t [a
nd ]
bu lly
in g
on lin
e ✓
L as
t 6
m on
th s
1, 01
6– 1,
76 2
(a cr
os s
4 tim
e po
in ts
)
12 –1
9 ye
ar s
T he N
et he
rl an
ds —
— —
T op
çu &
E rd
ur -
B ak
er (2
01 0)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
if et
im e/
no ne
pr ov
id ed
35 8
(S tu
dy 1)
; 33
9 (S
tu dy
2) 13
–2 1
ye ar
s T
ur ke
y —
— —
T op
çu &
E rd
ur -
B ak
er (2
01 2)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
as t
6 m
on th
s 79
5 13
–1 8
ye ar
s T
ur ke
y —
— —
T op
çu et
al .
(2 00
8) C
yb er
bu lly
in g
M ea
su re
m en
t ap
pr oa
ch un
cl ea
r ✓
a L
if et
im e/
no ne
pr ov
id ed
18 3
14 –1
5 ye
ar s
T ur
ke y
3. 3–
26 .2
a 8.
7– 25
.1 a
—
T ur
ne r
et al
. (2
01 1)
In te
rn et
ha ra
ss m
en t
U s[
in g]
th e
In te
rn et
to bo
th er
or ha
ra ss
.. .
or to
sp re
ad m
ea n
w or
ds or
pi ct
ur es
✓ L
as t
ye ar
2, 99
9 6–
17 ye
ar s
U .S
. 2.
7 —
—
T w
ym an
et al
. (2
01 0)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
as t
sc ho
ol ye
ar 10
4 11
–1 7
ye ar
s So
ut he
as te
rn U
.S .
— —
—
T yn
es et
al .
(2 01
0) O
nl in
e vi
ct im
iz at
io n
G en
er al
on lin
e vi
ct im
iz at
io n,
se xu
al on
lin e
vi ct
im iz
at io
n, in
di vi
du al
on lin
e ra
ci al
di sc
ri m
in at
io n,
an d
vi ca
ri ou
s on
lin e
ra ci
al di
sc ri
m in
at io
n
✓ L
if et
im e/
no ne
pr ov
id ed
47 6
14 –1
9 ye
ar s
M id
w es
te rn
U .S
. —
— —
V an
de bo
sc h
& V
an C
le em
pu t
(2 00
8)
C yb
er bu
lly in
g In
te rn
et an
d m
ob ile
ph on
e pr
ac tic
es ..
. in
te nd
ed by
th e
se nd
er to
hu rt
; [t
ha t
ar e]
pa rt
of a
re pe
tit iv
e pa
tte rn
of ne
ga tiv
e of
fl in
e or
on lin
e ac
tio ns
; an
d [a
re ]
pe rf
or m
ed in
a re
la tio
ns hi
p ch
ar ac
te ri
ze d
by a
po w
er im
ba la
nc e
✓ n/
a 27
9 10
–1 8
ye ar
s L
oc at
io n
un sp
ec if
ie d
— —
—
V an
nu cc
i et
al .
(2 01
2) C
yb er
bu lly
in g
N as
ty te
xt m
es sa
ge s,
ph on
e an
d In
te rn
et pi
ct ur
es /
ph ot
os or
vi de
o cl
ip s
of vi
ol en
t or
in tim
at e
sc en
es ,
na st
y or
ru de
e- m
ai ls
, [a
nd ]
in su
lts in
ch at
ro om
s
✓ L
as t
2 m
on th
s 21
1 14
–2 0
ye ar
s It
al y
— —
—
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
30 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
V ar
ja s
et al
. (2
00 9)
C yb
er bu
lly in
g Se
nd [i
ng ]
a th
re at
en in
g or
ha ra
ss in
g e-
m ai
l, in
st an
t m
es sa
ge ,
m es
sa ge
in a
ch at
ro om
, an
d sh
or t
te xt
m es
sa ge
(S M
S)
✓ L
if et
im e/
no ne
pr ov
id ed
42 7
G ra
de s
6– 8
So ut
he as
te rn
U .S
. —
— —
V ar
ja s
et al
. (2
01 0)
C yb
er bu
lly in
g M
ea su
re m
en t
ap pr
oa ch
un cl
ea r
✓ L
if et
im e/
no ne
pr ov
id ed
20 15
–1 9
ye ar
s U
.S .
— —
—
V az
so ny
i et
al .
(2 01
2) C
yb er
bu lly
in g
Sa y[
in g]
or do
[i ng
] hu
rt fu
l or
na st
y th
in gs
to so
m eo
ne ..
. on
th e
In te
rn et
or by
m ob
ile ph
on e
ca lls
, te
xt s
or im
ag e/
vi de
o te
xt s
✓ L
as t
ye ar
25 ,1
42 9–
16 ye
ar s
25 E
ur op
ea n
co un
tr ie
s —
— —
W ac
hs (2
01 2)
C yb
er bu
lly in
g B
ul ly
in g
th at
in cl
ud es
th e
us e
of in
fo rm
at io
n an
d co
m m
un ic
at io
n te
ch no
lo gi
es
✓ L
as t
ye ar
51 8
11 –1
7 ye
ar s
G er
m an
y 5.
0 6.
2 4.
2
W ac
hs &
W ol
f (2
01 1)
C yb
er bu
lly in
g [C
yb er
bu lly
in g
in vo
lv in
g] ha
ra ss
m en
t, de
ni gr
at io
n, ou
tin g,
or ex
cl us
io n
✓ c
L as
t 2
m on
th s
83 3
11 –1
7 ye
ar s
G er
m an
y 11
.5 22
.3 —
W ac
hs et
al .
(2 01
2) C
yb er
bu lly
in g
A n
ag gr
es si
ve ,
in te
nt io
na l
ac t
ca rr
ie d
ou t
by a
gr ou
p or
in di
vi du
al ,
us in
g el
ec tr
on ic
fo rm
s of
co nt
ac t,
re pe
at ed
ly an
d ov
er tim
e ag
ai ns
t a
vi ct
im w
ho ca
nn ot
ea si
ly de
fe nd
hi m
- or
he rs
el f
(d ir
ec t
qu ot
e fr
om P.
K .
Sm ith
et al
., 20
08 ,
p. 37
6)
✓ L
as t
ye ar
51 8
G ra
de s
5– 10
L oc
at io
n un
sp ec
if ie
d 5.
4 3.
9 —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
31CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
W ad
e &
B er
an (2
01 1)
C yb
er bu
lly in
g C
al lin
g pe
op le
na m
es ,
im ita
tin g
so m
eo ne
on lin
e, sp
re ad
in g
ru m
or s
ab ou
t so
m eo
ne el
se on
lin e,
th re
at en
in g
so m
eo ne
, se
nd in
g un
w an
te d
se xu
al co
nt en
t to
ot he
rs ,
se nd
in g
pr iv
at e
pi ct
ur es
of so
m eo
ne to
ot he
rs ,
an d
as ki
ng so
m eo
ne to
do so
m et
hi ng
se xu
al
✓ L
as t
3 m
on th
s 52
9 10
–1 3
an d
15 –1
7 ye
ar s
C an
ad a
21 .9
29 .7
—
W al
ra ve
& H
ei rm
an (2
01 1)
C yb
er bu
lly in
g B
ul ly
in g
ov er
th e
In te
rn et
or m
ob ile
ph on
e
✓ c
L if
et im
e/ no
ne pr
ov id
ed 1,
31 8
12 –1
8 ye
ar s
B el
gi um
34 .2
21 .2
—
W an
g, Ia
nn ot
ti, &
L uk
(2 01
0) C
yb er
bu lly
in g
B ul
ly in
g us
in g
co m
pu te
rs an
d ..
. ce
ll ph
on es
✓ L
if et
im e/
no ne
pr ov
id ed
6, 93
9 M
ea n
of 14
.4 ye
ar s
U .S
. 9.
9 —
—
W an
g, Ia
nn ot
ti, L
uk ,
& N
an se
l (2
01 0)
C yb
er bu
lly in
g B
ei ng
bu lli
ed by
ot he
rs us
in g
co m
pu te
rs ,
e- m
ai l
m es
sa ge
s, ..
. pi
ct ur
es ,
[a nd
] ce
ll ph
on es
✓ Pa
st co
up le
of m
on th
s 7,
47 5
G ra
de s
6– 10
U .S
. 10
.1 —
—
W an
g et
al .
(2 01
1) C
yb er
bu lly
in g
[B ul
ly in
g] us
in g
co m
pu te
rs or
us in
g ce
ll ph
on es
✓ Pa
st co
up le
of m
on th
s 7,
31 3
M ea
n of
14 .2
ye ar
s
U .S
. 10
.0 b
8. 5b
13 .8
b
W er
ne r
et al
. (2
01 0)
In te
rn et
ag gr
es si
on U
s[ in
g] th
e In
te rn
et to
th re
at en
or em
ba rr
as s
so m
eo ne
; e.
g. ,
by po
st in
g or
se nd
in g
m es
sa ge
s ab
ou t
th em
fo r
ot he
r pe
op le
to se
e; te
ll[ in
g] ot
he rs
to bl
oc k
in st
an t
m es
sa ge
s fr
om so
m eo
ne yo
u do
n’ t
lik e
or ar
e m
ad at
; us
[i ng
] th
e In
te rn
et to
pl ay
a jo
ke or
an no
y so
m eo
ne yo
u w
er e
m ad
at ;
m ak
[i ng
] ru
de or
na st
y co
m m
en ts
ab ou
t so
m eo
ne el
se on
lin e
✓ L
as t
30 da
ys 33
0 G
ra de
s 6–
8 N
or th
w es
te rn
U .S
. —
— —
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
32 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
W ill
ia m
s &
G ue
rr a
(2 00
7) In
te rn
et bu
lly in
g [T
el lin
g] lie
s ab
ou t
so m
e st
ud en
ts th
ro ug
h e-
m ai
l or
in st
an t
m es
sa gi
ng
✓ Si
nc e
th e
st ar
t of
sc ho
ol ye
ar (a
dm in
is te
re d
in sp
ri ng
te rm
)
1, 51
9 G
ra de
s 5,
8, an
d 11
M id
w es
te rn
U .S
. —
9. 4
—
W ol
ak et
al .
(2 00
7) O
nl in
e ha
ra ss
m en
t B
ot he
ri ng
or ha
ra ss
in g
[o th
er s]
on lin
e an
d ..
. us
[i ng
] th
e In
te rn
et to
th re
at en
or em
ba rr
as s
[o th
er s]
by po
st in
g or
se nd
in g
m es
sa ge
s ab
ou t
[o th
er s]
fo r
ot he
r pe
op le
to se
e
✓ L
as t
ye ar
1, 49
9 10
–1 7
ye ar
s U
.S .
9. 0
— —
Y ba
rr a
(2 00
4) In
te rn
et ha
ra ss
m en
t B
ot he
ri ng
or ha
ra ss
in g
[o th
er s]
w hi
le on
lin e
an d
.. .
po st
[i ng
] or
se nd
[i ng
] m
es sa
ge s
ab ou
t [o
th er
s] fo
r ot
he r
pe op
le to
se e
✓ L
as t
ye ar
1, 50
1 10
–1 7
ye ar
s U
.S .
6. 5
— —
Y ba
rr a,
D ie
ne r-
W es
t, &
L ea
f (2
00 7)
In te
rn et
ha ra
ss m
en t
R ec
ei v[
in g]
ru de
or na
st y
co m
m en
ts fr
om so
m eo
ne w
hi le
on lin
e; be
[i ng
] th
e ta
rg et
of ru
m or
s sp
re ad
on lin
e, w
he th
er th
ey w
er e
tr ue
or no
t; an
d re
ce iv
[i ng
] th
re at
en in
g or
ag gr
es si
ve co
m m
en ts
w hi
le on
lin e
✓ L
as t
ye ar
1, 58
8 10
–1 5
ye ar
s U
.S .
35 .0
— —
Y ba
rr a,
E sp
el ag
e, &
M itc
he ll
(2 00
7)
In te
rn et
ha ra
ss m
en t
M ak
[i ng
] ru
de co
m m
en ts
or m
ea n
co m
m en
ts to
an yo
ne on
lin e;
sp re
ad [i
ng ]
ru m
or s
ab ou
t so
m eo
ne ,
w he
th er
th ey
w er
e tr
ue or
no t;
[a nd
] m
ak [i
ng ]
ag gr
es si
ve or
th re
at en
in g
co m
m en
ts to
an yo
ne on
lin e
✓ L
as t
ye ar
1, 58
8 10
–1 5
ye ar
s U
.S .
34 .0
21 .0
14 .3
(t ab
le co
nt in
ue s)
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
33CYBERBULLYING REVIEW AND META-ANALYSIS
T ab
le 1
(c on
ti nu
ed )
St ud
y
C on
ce pt
ua liz
at io
n M
ea su
re m
en t
T im
e pa
ra m
et er
Sa m
pl e
ch ar
ac te
ri st
ic s
Pr ev
al en
ce
C on
ce pt
O pe
ra tio
na l
de fi
ni tio
n Si
ng le
ite m
(s )
M ul
ti- ite
m Q
ua lit
at iv
e N
A ge
or gr
ad e
L oc
at io
n %
V %
P %
V /P
Y ba
rr a
& M
itc he
ll (2
00 4a
)
In te
rn et
/o nl
in e
ag gr
es si
on M
ak in
g ru
de or
na st
y co
m m
en ts
to so
m eo
ne on
th e
In te
rn et
an d
us in
g th
e In
te rn
et to
ha ra
ss or
em ba
rr as
s so
m eo
ne w
ith w
ho m
[y ou
ar e]
m ad
✓ L
as t
ye ar
1, 50
1 10
–1 7
ye ar
s U
.S .
4. 0b
12 .0
b 3.
0b
Y ba
rr a
& M
itc he
ll (2
00 7)
In te
rn et
ha ra
ss m
en t
U s[
in g]
th e
In te
rn et
to ha
ra ss
or em
ba rr
as s
so m
eo ne
[y ou
] ar
e m
ad at
an d
.. .
m ak
[i ng
] ru
de or
na st
y co
m m
en ts
to so
m eo
ne el
se on
lin e
✓ L
as t
ye ar
1, 50
0 10
–1 7
ye ar
s U
.S .
— 29
.0 —
Y ba
rr a
et al
. (2
00 6)
In te
rn et
ha ra
ss m
en t
B ot
he ri
ng or
ha ra
ss in
g [o
th er
s] on
lin e
an d
.. .
us [i
ng ]
th e
In te
rn et
to th
re at
en or
em ba
rr as
s [o
th er
s] by
po st
in g
or se
nd in
g m
es sa
ge s
ab ou
t [o
th er
s] fo
r ot
he r
pe op
le to
se e
✓ L
as t
ye ar
1, 50
0 10
–1 7
ye ar
s U
.S .
9. 0
— —
Y ilm
az (2
01 1)
C yb
er bu
lly in
g Po
st in
g m
ea n
or hu
rt fu
l co
m m
en ts
on lin
e; po
st in
g a
m ea
n or
hu rt
fu l
pi ct
ur e
on lin
e; po
st in
g a
m ea
n or
hu rt
fu l
vi de
o on
lin e;
cr ea
tin g
a m
ea n
or hu
rt fu
l w
eb pa
ge ;
sp re
ad in
g ru
m or
s on
lin e;
th re
at en
in g
th ro
ug h
a ce
ll ph
on e
te xt
m es
sa ge
; th
re at
en in
g to
hu rt
on lin
e; [a
nd ]
pr et
en di
ng to
be so
m eo
ne on
lin e
an d
ac tin
g in
a w
ay th
at w
as m
ea n
or hu
rt fu
l
✓ L
if et
im e/
no ne
pr ov
id ed
75 6
G ra
de 7
T ur
ke y
17 .9
6. 4
—
N ot
e. W
he re
as no
t al
l re
se ar
ch er
s us
ed th
e te
rm “c
yb er
bu lly
in g,
” ea
ch of
th es
e st
ud ie
s m
ea su
re d
as pe
ct s
of th
e br
oa d
cy be
rb ul
ly in
g co
ns tr
uc t
pr es
en te
d he
re .T
ex t
in br
ac ke
ts w
as ad
de d
to m
ak e
th e
de fi
ni tio
n cl
ea re
r. D
as he
s in
di ca
te th
at th
e va
ri ab
le w
as no
ta ss
es se
d in
th e
st ud
y. V
� vi
ct im
s; P
� pe
rp et
ra to
rs ;V
/P �
vi ct
im /p
er pe
tr at
or s;
IC T
� in
fo rm
at io
n an
d co
m m
un ic
at io
n te
ch no
lo gi
es ;S
M S
� sh
or t
m es
sa ge
se rv
ic e;
n/ a
� no
t av
ai la
bl e.
a D
en ot
es pr
ev al
en ce
ra te
s di
ff er
by ve
nu e.
b D
en ot
es ca
te go
ri es
ar e
m ut
ua lly
ex cl
us iv
e. c
D en
ot es
a m
ul ti-
ite m
m ea
su re
m en
t ap
pr oa
ch w
as us
ed ,
bu t
pr ev
al en
ce ra
te s
w er
e ba
se d
on si
ng le
ite m
m ea
su re
s. d
St ud
y 2
is no
t in
cl ud
ed be
ca us
e pr
ev al
en ce
da ta
w er
e no
t re
po rt
ed .
e B
as ed
on a
Sp an
is h–
E ng
lis h
tr an
sl at
io n
co nd
uc te
d by
th e
th ir
d au
th or
of th
e cu
rr en
t pa
pe r.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
34 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
depends on the particular study being reviewed and the most frequently used method of digital communication among sample participants at the time. Katzer et al. (2009), in an investigation of cyberbullying victimization among 1,700 fifth through 11th grade male and female students in Germany, found that chat rooms were used as an avenue of communication at least once a week by 69% of the adolescents surveyed, and 35% of the adolescents had been victimized while chatting. Juvonen and Gross (2008) found that the most prevalent venues for cyberbullying among American students ages 12 to 17 were message boards (26%) and instant messaging (20%). Kowalski and Limber (2007) found instant messaging (66.6%) to be the most frequently used venue for cyberbullying. Given the rise of social networking sites, these sites will likely emerge as primary venues for victimization and perpe- tration in the not too distant future.
Cyberbullying Versus Traditional Bullying
A logical question to ask when investigating cyberbullying is the degree to which our knowledge of traditional bullying carries over to this newer mode of bullying. Cyberbullying shares with traditional bullying three primary features: It is an act of aggres- sion; it occurs among individuals among whom there is a power imbalance; and the behavior is often repeated (Hunter, Boyle, & Warden, 2007; Kowalski, Limber, & Agatston, 2012; Olweus, 1993, 2013; P. K. Smith, del Barrio, & Tokunaga, 2012). The aggressive nature of cyberbullying is discussed later in this article, although few would question that cyberbullying is an aggressive action. As with traditional bullying, the power imbalance with cyberbullying can take any of a number of forms: physical, social, relational, or psychological (Dooley, Pyżalski, & Cross, 2009; Monks & Smith, 2006; Olweus, 2013; Pyzalski, 2011). Of impor- tance, the fact that one person is more technologically savvy than another can create a power imbalance. Furthermore, the anonymity inherent in many cyberbullying situations may create a sense of powerlessness on the part of the victim (Dooley et al., 2009; Vandebosch & Van Cleemput, 2008).
In spite of the similarities between traditional bullying and cyberbullying, the two behaviors are distinct from each other in critical ways. Perpetrators of cyberbullying often perceive them- selves to be anonymous. Research on deindividuation (Diener, 1980; Postmes & Spears, 1998) shows that people will say and do things anonymously that they would not say or do in face-to-face interactions. This anonymity significantly opens up the pool of potential perpetrators of cyberbullying, compared to traditional bullying. For example, individuals who cyberbully do not have to worry whether their physical stature is greater than that of their victim.
Anonymity has another adverse effect. In face-to-face bullying, people can observe the impact their behavior has on the victim. For some perpetrators, the recognition that they have hurt their victim is enough to deter further bullying behavior. With cyberbullying, there is no direct way for perpetrators to know the effect of their behavior on the victim. Thus, chances for empathy and remorse are significantly reduced (Sourander et al., 2010).
Cyberbullying and traditional bullying also differ in the acces- sibility of the victim. Traditional bullying occurs most frequently at school during the school day (Nansel et al., 2001). Individuals who engage in cyberbullying, on the other hand, can perpetrate
cyberbullying behavior 24 hours a day, 7 days a week. At any time during the day or night, they can create websites, send text mes- sages, or post messages about others on the Internet. Additionally, because of the nature of the venues through which cyberbullying occurs, it has a much greater potential audience than traditional bullying. For example, thousands of people may view insulting posts online, whereas only a dozen may view a bullying incident at school.
Because of the nature of the technology used to cyberbully, the “reward for engaging in cyberbullying is often delayed compared to traditional bullying” (Vannucci, Nocentini, Mazzoni, & Men- esini, 2012, p. 185; see also Dooley et al., 2009). Individuals who cyberbully cannot see the immediate effects of their bullying on the victim. Any response that may be offered by the victim may be delayed as a function of when the victim becomes aware of the cyberbullying (e.g., checks the text message, views the website). This timing issue suggests that perhaps there are different motives behind the two types of bullying behavior. That is, motives for perpetrating cyberbullying may be more intrapersonal, whereas those for traditional bullying may be more interpersonal. In other words, although empirical research is needed to investigate this suggestion, the rewards for engaging in cyberbullying may be tied more to performing the action than to witnessing the consequences of that action or to having other “bystanders” witness the effects of one’s aggressive behaviors on another individual.
In addition to investigating these conceptual differences, re- searchers have empirically tested the overlap between involvement in traditional bullying and cyberbullying. P. K. Smith et al. (2008) found that many victims of cyberbullying were also victims of traditional bullying (see also Gradinger, Strohmeier, & Spiel, 2009; Kowalski, Morgan, & Limber, 2012; Privitera & Campbell, 2009; Kessel Schneider, O’Donnell, Stueve, & Coulter, 2012), and they found a similar correspondence between perpetrators of cy- berbullying and perpetrators of traditional bullying. Additionally, Hinduja and Patchin (2008) found that individuals who had per- petrated cyberbullying within the previous 6 months were 2.5 times more likely to also perpetrate traditional bullying than were those who had not been involved with cyberbullying. Similarly, individuals who were victims of traditional bullying within the previous 6 months were 2.5 times more likely to also be victims of cyberbullying. Sourander et al. (2010) found positive associations between traditional bullying and cyberbullying, traditional victim- ization and cybervictimization, and traditional bully/victim status and cyberbullying victimization and cyberbully/victim status. Sim- ilarly, Olweus (2012) noted a high correspondence between in- volvement in traditional bullying and cyberbullying. Indeed, on the basis of these results, Olweus (2013, p. 767) stated, “to be cyber- bullied or to cyberbully others seems to a large extent to be part of a general pattern of bullying, where use of the electronic media is only one possible form.” As a number of studies have been conducted on the relationship between cyber- and traditional bul- lying perpetration and victimization, meta-analytic correlations can be computed to approximate the population-level relationship between these variables. These meta-analytic results are described below.
Not all researchers, however, have found such strong relation- ships between the two types of bullying. For instance, Varjas, Henrich, and Meyers (2009) found cybervictimization and cyber- perpetration to be highly correlated but found neither of these to be
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
35CYBERBULLYING REVIEW AND META-ANALYSIS
strongly related to other types of bullying. Thus, the overlap may be determined by the specific venue in which the cyberbullying occurs. In other words, individuals who traditionally bully may be more likely to perpetrate certain kinds of cyberbullying, thinking that they may be more anonymous (e.g., via instant messaging) and be more likely to be targets of cyberbullying via other venues. For example, perpetrators of cyberbullying who are retaliating for traditional bullying victimization may use social media to increase the probability of publicly humiliating the traditional bullying perpetrator. Future research is needed to investigate this relation- ship further. Additionally, researchers have found that the two forms of bullying do not overlap entirely. Specifically, there ap- pears to be a small group of youth (�10%–15%) who experience cyberbullying victimization or perpetration but do not experience bullying in traditional ways (Olweus, 2012; Raskauskas, 2010; Raskauskas & Stoltz, 2007).
Prevalence
Of late, researchers have debated whether the incidence of cyberbullying is on the rise or whether it has leveled out. Some, such as Slonje and Smith (2008), have suggested that, with chang- ing types of technology, cyberbullying prevalence rates are in- creasing. Even more recently, however, Olweus (2012; see also Olweus, 2013) argued that the incidence of cyberbullying has not increased over the last few years. Whether rates are staying the same or slightly increasing is difficult to determine, as prevalence rates of cyberbullying victimization/perpetration are highly vari- able across studies, related in large part to the manner in which cyberbullying is defined (for a more detailed discussion of this issue, see Olweus, 2013), differences in the ages and locations of the individuals sampled, the reporting time frame being assessed (e.g., lifetime, 2 months, 6 months), and the frequency rate by which a person is classified as a perpetrator or victim (e.g., at least once, several times a week). As an example, in one survey of 655 teens age 13–18, 15% reported having ever been cyberbullied (10% via cell phone). Seven percent indicated that they had ever cyberbullied another online (5% by cell phone; Cox Communica- tions, 2009). In the Fight Crime telephone surveys, 17% of 6- to 11-year-olds had been cyberbullied within the past year; 36% of 12- to 17-year-olds had been cyberbullied in the prior year (Fight Crime: Invest in Kids, 2006). Hinduja and Patchin (2009) surveyed middle school students and found that 9% had been cyberbul- lied in the last 30 days, 17% in their lifetime. Eight percent had cyberbullied others in the last 30 days, 18% in their lifetime. Similarly, in a survey of 3,767 students in Grades 6 through 8, Kowalski and Limber (2007) found that 18% had been cyber- bullied at least once within the previous 2 months; 11% had cyberbullied others within the 2 months prior to completing the survey. Additional studies examining the prevalence of cyber- bullying can be found in Table 1.
In general, prevalence estimates for cyberbullying victimization range between approximately 10 and 40% (e.g., Lenhart, 2010; O’Brennan, Bradshaw, & Sawyer, 2009; Pontzer, 2010). Two studies are noteworthy, however. Juvonen and Gross (2008) stated that 72% of their respondents reported being victimized. However, Juvonen and Gross (2008) did not specifically use the term cyber- bullying, instead asking participants the extent to which they had experienced “mean things” online, which they defined as “any-
thing that someone else does that upsets or offends someone” (p. 499). Additionally, Aftab (2011) found, based on responses to her online survey at wiredsafety.org, that 53% of adolescents age 12–13 are victims of cyberbullying (see also Raskauskas & Stoltz, 2007). In spite of this variance in prevalence across studies, the fact remains that cyberbullying is a serious problem confronting youth today.
Country of Origin
The problem of cyberbullying is not limited to particular cul- tures but rather can be found throughout the world (T. Smith, 2012). However, much work remains to be done in the area of cross-cultural examinations of bullying and cyberbullying. Much of the cross-cultural research conducted on “bullying” can be found by indexing the term “peer victimization” rather than bul- lying. One reason is that the broader term (i.e., peer victimization) allows for cross-cultural variations in the behavior of interest. For example, countries that use more inclusive definitions of bullying (e.g., including physical, verbal, and relational bullying) often show higher prevalence rates than countries that use more restric- tive definitions (e.g., including only physical and verbal bullying; Cross, Li, P. K. Smith, & Monks, 2012; P. K. Smith, Cowie, Olafsson, & Liefooghe, 2002). P. K. Smith et al. (2002) suggested that one way to avoid conceptual confusion regarding bullying is to inquire about specific bullying experiences that partici- pants have experienced. The same is true with cyberbullying. Participants who are asked whether they have ever been cyber- bullied often report slightly different experiences than they do when asked if they have been bullied via instant messaging, by e-mail, or on a web page, and so on. Although little research has examined cross-cultural differences in cyberbullying, studies examining cross-cultural differences in aggression indicate that Australia and many European countries tend to be less aggres- sive than the United States (Bergeron & Schneider, 2005), suggesting that there may be similar differences when it comes to cyberbullying. Because prevalence rates may vary depending on the country in which cyberbullying is studied, this variable will be examined as a moderator in the meta-analysis that follows.
Measurement of Cyberbullying
Some have noted that the cyberbullying research domain has a measurement problem (Menesini & Nocentini, 2009; Menesini, Nocentini, & Calussi, 2011; Rivers, 2013). Part of the reason for the added attention to the issue of measurement is the wide- ranging prevalence rates for the occurrence of cyberbullying, as noted above. Beyond their differences in sample characteristics (e.g., age, gender, country of origin), studies also differ on a number of important factors with regard to measurement, and these differences may influence prevalence rates and relationships among measured variables. Some of these factors include the nature of the items utilized in the cyberbullying measure, whether a definition of bullying is provided, and whether traditional bul- lying is also measured (David-Ferdon & Hertz, 2007; Kowalski, Limber, & Agatston, 2012). Each of these factors is described below.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
36 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
Nature of Items
A key goal when measuring any construct is to ensure that the measure is capturing the full conceptual domain of the construct of interest while not measuring things outside the purview of the construct domain (Murphy & Davidshofer, 2005). To obtain this content-related and construct validity, one must first define the domain of interest and then develop and test behaviorally based items that map onto that definition. As noted earlier, for cyberbul- lying, the definition contains four components: (a) intentional aggressive behavior that (b) is carried out repeatedly, (c) occurs between a perpetrator and victim who are unequal in power, and (d) occurs through electronic technologies. Many of the existing measures of cyberbullying are missing one or more components of this definition. For example, the measure employed by Williams and Guerra (2007) covers intentional aggression but not the re- peated nature, because they consider responses of 1–2 times as experiencing cyberbullying, whereas this may have only been a onetime occurrence (and arguably not cyberbullying). Others have blurred the line between intentional behavior and ambiguous be- havior. For example, Hinduja and Patchin (2007) included “ig- nored” and “disrespected” as two items in their measure. Even though these behaviors might be unintentional on the part of the perpetrator, the victim might perceive them as being aggressive. Future research in this area will benefit from a more construct- driven measurement approach that contains items that tap into the full range of cyberbullying behaviors.
Existing measures of cyberbullying generally fall into two cat- egories: single-item measures or multi-item checklists (see Table 1 for a summary of the measurement approach from studies in the review). Of the single-item measures, many have included a def- inition of cyberbullying and then simply asked participants to indicate how often they have experienced this behavior (e.g., Hinduja & Patchin, 2008; Mesch, 2009; Williams & Guerra, 2007; Wolak, Mitchell, & Finkelhor, 2007). Single-item measures are seen as advantageous over longer scales because they tend to be more cost-efficient and practical and allow for faster administra- tion (Solberg & Olweus, 2003). Other researchers have noted that a single-item measure is sufficient in research domains that have a single referent that is easy to recognize and understand (Menesini & Nocentini, 2009). However, recent research also suggests that use of a single-item measure may have some drawbacks. More specifically, Vaillancourt et al. (2010) found that measurement sensitivity was lower when using the global, single-item questions of the Olweus Bully/Victim Questionnaire compared to a series of questions asking about specific forms of bullying (e.g., verbal, social, physical, and cyber). That is, prevalence rates are likely to be lower when using a single, global item to assess overall bullying behavior than when using multiple specific items to assess differ- ent forms of bullying behavior (see also Gradinger, Strohmeier, & Spiel, 2010). Because prevalence rates vary based on whether cyberbullying is measured with a single versus multiple items, relationships among cyberbullying and other variables may also vary based on this issue. Thus, this variable will be examined as a moderator in the meta-analysis.
Multiple-item measures are the other main measurement tech- nique employed by cyberbullying researchers (see, e.g., Hinduja & Patchin, 2008; P. K. Smith et al., 2008; Ybarra et al., 2008). Many of these measures take the form of a checklist of behaviors, and
participants are asked to indicate the frequency of their occurrence. Proponents of the multi-item measurement format note that these scales tend to be more reliable, can cover complex constructs more fully (thus making it more valid for predictions), and also allow for summing to a total score (Menesini et al., 2011). A key limitation, however, is that not all cyberbullying behaviors are included in each study, and often the behaviors included differ from one another in severity, making it challenging to interpret a summed or average score on these scales. For example, Menesini et al. (2011) tested 10-item measures of cyberbullying and cybervictimization for severity (i.e., the degree to which an item is a strong or weak example of cyberbullying) and discrimination (i.e., the degree to which an item can distinguish between different levels of cyber- bullying), finding that silent/prank phone calls were low in severity and discrimination and that nasty or rude e-mails and insults on websites were high in both severity and discrimination. These results highlight the need for authors to examine measures of cyberbullying with confirmatory factor analysis and item-response theory to determine the factor structure and item characteristics and to refine their measures before conducting a study.
Another important consideration is how responses might differ for a global evaluation (single item) versus a single specific behavior (as in a multiple-item scale with several different behav- iors). People may be less willing to respond honestly to the global evaluation because they do not want to label themselves as a bully or a victim, but they may indicate that they have indeed experi- enced several specific bullying behaviors in the past. This issue is noted in the traditional bullying literature (Menesini, Modena, & Tani, 2009; Menesini, Nocentini, & Fonzi, 2007), as well as in the cyberbullying literature (Ybarra et al., 2012).
Another point in favor of multi-item measurement has to do with reliability of measurement. When holding other factors con- stant, increasing the number of items in a measure has the effect of increasing the reliability of that measure (Murphy & Davidshofer, 2005). One major concern of using unreliable measures is that a scale cannot be valid if it is not reliable. In addition to being less reliable, single-item measures tend to be more prone to random error. Random error (e.g., response tendencies such as acquies- cence, extreme responding, and social desirability) is present in virtually every measure, but this unreliability is exacerbated in a single-item measure because of limitations in our ability to detect it. With multi-item measures, researchers can sum or average the items together and reduce some of this error. Researchers are also able to determine the scale’s reliability and then take action to remove sources of unreliability (e.g., by removing poorly func- tioning items).
Research with multi-item measures has begun to provide infor- mation on the factor structure of cyberbullying. Dempsey, Sulkowski, Nichols, and Storch (2009) showed that cybervictim- ization is a distinct construct from other forms of traditional bullying victimization (i.e., overt and relational). Other research by Menesini et al. (2011) demonstrated that cyberbullying and cyber- victimization could be represented equally well with a two-factor model (phone vs. computer-based or written messages vs. pictures/ telephone calls) or a single-factor model. Recent work by Law and colleagues (Law, Shapka, Domene, & Gagné, 2012; Law, Shapka, Hymel, Olson, & Waterhouse, 2012) found that adolescents did not differentiate their responses in terms of the role played in cyberbullying (victim or bully) but rather the medium through
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
37CYBERBULLYING REVIEW AND META-ANALYSIS
which it occurred (messages vs. pictures vs. websites created). These results provide further evidence for the contention that those who cyberbully also tend to be cybervictims. Additionally, these studies provide preliminary evidence of a multifactorial structure of cyberbullying measures.
In sum, researchers should be aware that single-item measure- ment of cyberbullying comes with many serious limitations and should choose their measurement approach carefully. Future re- search on cyberbullying may be well suited to the use of multi- item behavioral checklists that share a response scale (e.g., 1 to 5: never; only once or twice; two or three times per month; once or twice per week; several times per week) and utilize the same reporting time frame (e.g., past 6 months). Additionally, further work is needed that utilizes structural equation modeling and confirmatory factor analysis to determine the factor structure (i.e., the core features) of cyberbullying and how the features map onto the main components of the cyberbullying definition (Law, Shapka, Hymel, et al., 2012; Menesini et al., 2011).
Provision of a Bullying Definition
Another way in which cyberbullying studies have differed from one another is whether a definition of bullying (or cyberbullying) is provided along with the measure or whether the word “bully” is mentioned at all. Many studies have utilized a measure of cyber- bullying that does not provide a definition or use the word “bully” (see, e.g., Dempsey et al., 2009; Hay & Meldrum, 2010; Williams & Guerra, 2007), with the goal of avoiding the issue of labeling students as “bullies” or “victims” or of perhaps missing some participants whose experiences differ from the definition. Other studies have included a definition of bullying or cyberbullying, often in an attempt to mirror measurement of traditional bullying with the Olweus Bully/Victim Questionnaire (e.g., Dehue, Bol- man, Völlink, & Pouwelse, 2012; Monks, Robinson, & Worlidge, 2012; Vandebosch & Van Cleemput, 2009).
The impact of providing a definition on prevalence rates of cyberbullying has received recent research attention.3 Ybarra et al. (2012) randomly assigned four participants to complete one of four versions of a survey to measure cyberbullying victimization prev- alence: The first included both a definition and the word “bully”; the second included only a definition; the third included only the word “bully”; and the final version contained neither a definition nor the word “bully.” All groups then indicated the extent to which they experienced seven different forms of bullying. Results indi- cated that prevalence rates of bullying victimization were highest in the group that was presented with neither the definition nor the word “bully.” Additionally, results were similar between the “bully”-term-only survey and the definition-only survey. Because relationships between cyberbullying and other variables might also vary based on inclusion of a definition of (cyber)bullying or the word “bully,” this variable will also be included as a moderator in the meta-analysis.
Comeasurement of Traditional Bullying
One final measurement issue is whether a given study has also measured traditional bullying. Depending on the purpose of a given study, many have measured both cyberbullying and tradi- tional bullying (e.g., Bauman & Pero, 2011; Dooley, Gradinger,
Strohmeier, Cross, & Spiel, 2010; Ybarra, Diener-West, & Leaf, 2007), whereas other studies have measured only cyberbullying (e.g., Goebert, Else, Matsu, Chung-Do, & Chang, 2011; Huang & Chou, 2010; MacDonald & Roberts-Pittman, 2010; Şahin, 2012). Because traditional bullying is occurring at higher rates than cyberbullying (Olweus, 2012, 2013), one potential issue is that, if a study measures only cyberbullying and not also traditional bul- lying, reports of the frequency of cyberbullying may be inflated. A possible reason is that participants may be drawing on their mem- ory of experiences with all forms of bullying when responding to the measure of cyberbullying, and, without a place to report these experiences, some of these experiences may show up in the mea- sure of cyberbullying (Gradinger et al., 2010; Kowalski & Limber, 2013). This measurement feature may also affect the prevalence of reported cyberbullying or cybervictimization.
The ideal way to examine the independent effects of cyberbul- lying over and above traditional bullying would be for studies to conduct a hierarchical regression analysis with traditional bullying entered in the first step and cyberbullying entered in the second step as predictors of an outcome. This procedure would allow researchers to examine the incremental variance accounted for by cyberbullying beyond that accounted for by traditional bullying. Given that few studies report these types of analyses, a meta- analysis of such an effect size was not possible, and we suggest that future research be conducted with such analyses. In the meta- analysis below, we treat co-measurement of traditional bullying as a categorical moderator to determine the extent to which including a measure of traditional bullying moderates the relationships be- tween cyberbullying or cybervictimization and other variables.
Theoretical Background
A theoretical basis is essential not only for uncovering the influential factors involved in a cyberbullying event but also for designing assessment measures and interventions that effectively target personal and environmental factors involved in cyberbully- ing victimization and perpetration. As noted in previous reviews (e.g., Slonje, Smith, & Frisén, 2012), the cyberbullying literature to date lacks a solid theoretical foundation. Whereas several pre- vious studies on (cyber)bullying have utilized social information processing (Crick & Dodge, 1994) or social cognitive (Bandura, 1986) theories to help organize and understand the phenomenon of (cyber)bullying, the general aggression model (GAM) may help us understand the personal and situational factors at play. This model provides a comprehensive framework that integrates domain- specific theories of aggression (Anderson & Bushman, 2002; see Figure 1), and it has been utilized in previous research on bullying behaviors (e.g., Gullone & Robertson, 2008; Vannucci et al., 2012). In this article, the GAM will be used to explain factors related to both victimization and perpetration, as victims and perpetrators are often one and the same person in cyberbullying situations (e.g., bully/victims). The GAM relies heavily on cogni-
3 In a seminal review article, Olweus (2013) discussed in extensive detail the issue of how cyberbullying should be defined and measured, particularly in relation to traditional bullying. Olweus (2013) suggested “it is necessary and beneficial to place cyberbullying in proper context (with traditional bullying) and to have a more realistic picture of its prevalence and nature” (p. 768).
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
38 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
tive knowledge structures (i.e., scripts and schemas) and centers around three areas of emphasis: person and situational inputs; cognitive, affective, and arousal routes that influence the present internal state; and the appraisal and decision-making processes that lead to outcome behaviors (Anderson & Bushman, 2002). In the sections that follow, each of these areas is discussed within the context of cyberbullying victimization and perpetration.
Knowledge Structures
Knowledge structures consist of associated information that has been stored in semantic memory. These structures encompass the scripts and schemas one depends on to understand and behavior- ally navigate through daily situations. In an overarching sense, knowledge structures can be considered the personality character- istics that an individual brings to any given social situation (An- derson & Bushman, 2002). In a cyberbullying context, the parties involved have a number of different knowledge structures. Spe- cifically, victims, perpetrators, and bystanders enter cyberbullying situations with varying backgrounds, experiences, attitudes, de- sires, personalities, and motives that intersect to determine the course of the interaction. These knowledge structures define the individual input variable of personality and help to determine situations toward which individuals will be drawn. Thus, knowl-
edge structures are the foundation upon which inputs in the GAM rest.
Inputs
Initially, the GAM focuses upon factors associated with the individual and the situation that influence aggressive behavior. Person factors include personality traits, attitudes, motives, gender, beliefs, values, long-term goals, behavioral scripts, and any other consistent characteristics the individual brings to the situation. Situational factors, on the other hand, are characteristics of the environment and include, but are not limited to, aggressive cues, provocation, sources of frustration, drugs, external sanctions, and incentives. Situational factors also include the degree to which the social situation restricts or offers an opportunity to act aggres- sively. Each of the aforementioned person and situational factors influences an individual’s cognition, affect, and level of arousal, predisposing to aggressive behavior (Anderson & Bushman, 2002). In regard to cyberbullying, the technological media through which such actions are perpetrated present numerous situational factors that differ from traditional bullying and are essential to consider. Person and situational factors theorized to be inputs in perpetration and/or victimization (see Figure 1) of the GAM pro- cess for cyberbullying are described below.
Cyberbullying perpetration Inputs
P F t
Routes
A i l
Proximal Processeses Distal Outcomes
P t I t lPerson Factors: - Gender - Age - Motives - Personality - Psychological states - SES and technology use
Values and perceptions
Appraisal: - Primary - Secondary
- Psychological health - Physical health - Social functioning - Behavioral problems
Decision making:
Present Internal State:
- Cognition - Affect - Arousal
Interaction of
Cyberbullying Encounter
- Values and perceptions - Other maladaptive behavior
Situational Factors: - Provocation/Support - Parental involvement
Decision-making: - Thoughtful action - Impulsive action
- Interaction of internal states
Parental involvement - School climate - Perceived anonymity
Cyberbullying victimization Inputs
Person Factors: - Gender - Age - Personality - Psychological states
Routes
Present Internal State:
- Cognition Aff t
Proximal Processes
Cyberbullying Encounter
Distal Outcomes
- Psychological health - Physical health - Social functioning
B h i l bl
Appraisal: - Primary - Secondary
- Psychological states - SES and technology use - Values and perceptions - Other maladaptive behavior
Situational Factors:
- Affect - Arousal - Interaction of
internal states
- Behavioral problems
Decision-making - Thoughtful action - Impulsive action
Situational Factors: - Perceived support - Parental involvement - School climate
Figure 1. View of a cyberbullying encounter through the general aggression model. The dashed line indicates how a victim of cyberbullying might become a perpetrator of cyberbullying. SES � socioeconomic status.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
39CYBERBULLYING REVIEW AND META-ANALYSIS
Person Factor 1: Gender. Research on traditional bullying has consistently shown that boys engage in bullying to a greater degree than girls (Olweus & Limber, 2010), and the aggression is more often of a direct nature (whereas girls more frequently engage in indirect types of aggression; Dilmac, 2009). Cyberbul- lying is a form of indirect aggression, which might lead one to conclude that girls would be more likely than boys to experience cyberbullying as both victims and perpetrators. Although some research supports this hypothesis (e.g., Kowalski & Limber, 2007), other research has found no statistically significant difference between girls and boys in rates of cyberbullying perpetration or victimization (e.g., Hinduja & Patchin, 2008; Slonje & Smith, 2008; P. K. Smith et al., 2008; Ybarra & Mitchell, 2004a). Still other research finds that boys are more likely than girls to perpe- trate cyberbullying, but that there are no gender differences in victimization rates between males and females (Li, 2006). Other studies have found that boys are more likely than girls to perpetrate cyberbullying, but girls are more likely to be the targets of cyber- bullying (Sourander et al., 2010). One final group of investigators suggests that gender differences depend on the venue by which the cyberbullying is occurring; for example, girls seem to be targeted via e-mail more frequently than boys (Hinduja & Patchin, 2008), whereas boys are bullied through text messaging more often than girls (Slonje & Smith, 2008; see also Juvonen & Gross, 2008; P. K. Smith et al., 2008).
Person Factor 2: Age. Research on traditional bullying shows that prevalence rates of bullying peak during middle school, as youth work to establish their place in the social hierarchy (Varjas et al., 2009). Likewise, cyberbullying is particularly prevalent among middle school children (Kowalski, Limber, & Agatston, 2012); however, even among middle school children, there are developmental variations. For example, Williams and Guerra (2007) found that cyberbullying increases after fifth grade and peaks during eighth grade (see also Hinduja & Patchin, 2008). However, other researchers suggest that age differences depend on the method by which the cyberbullying occurs. Specifically, P. K. Smith et al. (2008) observed that text messaging, picture bullying, and instant messaging were less common with younger than older youth.
More recently, research has examined cyberbullying among college students (Kowalski, Giumetti, et al., 2012). In one study, Kowalski, Giumetti, et al. (2012) found that over 30% of college student respondents indicated that their first experience with cy- berbullying was in college. Even including those who had been cyberbullied in middle and high school, 43% of the respondents indicated that the majority of the cyberbullying they had experi- enced had occurred during college.
Person Factor 3: Motives. Little research has examined peo- ple’s motives for engaging in cyberbullying (Law, Shapka, Do- mene, & Gagné, 2012). However, the relationship between tradi- tional bullying and cyberbullying discussed earlier suggests that some individuals may engage in cyberbullying as a way of retal- iating for traditional bullying victimization (Dooley et al., 2009; Hemphill et al., 2012; Raskauskas & Stoltz, 2007) or previous involvement with cyberbullying as either victim or perpetrator (Dilmac, 2009; Kowalski, Morgan, & Limber, 2012). Others may engage in cyberbullying to demonstrate technological skill, for fun, or to feel powerful. Gradinger, Strohmeier, and Spiel (2012) found the most common motive was anger.
Person Factor 4: Personality. An obvious variable that may be related to the perpetration of cyberbullying is empathy. Ang and Goh (2010) distinguished cognitive empathy (i.e., the ability to understand the emotions of others) from affective empathy (i.e., the ability to experience and share the emotions of others). Among individuals with low affective empathy, both boys and girls with low cognitive empathy reported engaging in more cyberbullying behaviors than did those with high cognitive empathy. Among girls with high affective empathy, low and high levels of cognitive empathy resulted in similar levels of cyberbullying behaviors. Thus, the role of cognitive empathy appears to be important in predicting cyberbullying behaviors (see also Steffgen, König, Pfet- sch, & Melzer, 2011). Another relevant personality trait is narcis- sism, a core feature of which is exploitativeness, or taking advan- tage of others for personal gain. This feature has been linked with both traditional bullying and cyberbullying perpetration (Ang, Tan, & Mansor, 2011; Fanti, Demetriou, & Hawa, 2012).
On the cyberbullying victimization side, several personality variables have been identified as possible predictors. For example, Hunt, Peters, and Rapee (2012) identified a negative relationship between social intelligence and both traditional victimization and cybervictimization (see also Schultze-Krumbholz & Scheithauer, 2009b). Additionally, a number of studies identified a positive association between hyperactivity (or features of attention-deficit/ hyperactivity disorder) and cybervictimization (Dooley et al., 2010; Dooley, Shaw, & Cross, 2012; Feldman, 2011). A number of other personality variables may play a role in making an individual more susceptible to cyberbullying or cybervictimization, and we encourage future research that helps to uncover such variables.
Person Factor 5: Psychological states. Individuals who per- petrate and are victims of cyberbullying also score higher in depression and anxiety and lower on measures of self-esteem, perhaps accounting for the lower academic performance of those involved with cyberbullying (Kowalski & Limber, 2013; Kowal- ski, Limber, & Agatston, 2012). Compared to youth not involved with Internet harassment, online aggressors have lower school commitment, dislike school more, and report lower grades (Ybarra & Mitchell, 2004a; see also Kowalski & Limber, 2013). However, although Beran and Li (2007) did not find evidence that perpetra- tors of cyberbullying missed school more or reported lower grades than did those not involved with cyberbullying, they did find that perpetrators reported problems with concentration. One issue with these correlations, however, is that, whereas problems such as depression and anxiety may be predictors of involvement in cy- berbullying, they may also be consequences of the behavior.
Person Factor 6: Socioeconomic status and technology use. Isolated studies have examined additional predictors of cyberbul- lying perpetration, including socioeconomic status (SES) and stan- dards of Internet/technology use. Wang, Iannotti, and Nansel (2009) found a positive relationship between SES and cyberbul- lying perpetration. An obvious explanation for this is that individ- uals from higher SES levels typically have more frequent access to technology. Not surprisingly, perceived technological expertise also bears a direct relationship with cyberbullying perpetration (Walrave & Heirman, 2011; Ybarra & Mitchell, 2004a). This latter finding is likely confounded with Internet use. Individuals who spend more time on the Internet will (a) develop greater expertise with the use of technology and (b) probabilistically be more likely to become involved with cyberbullying as victim or perpetrator
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
40 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
due to the time spent online (Didden et al., 2009). Support for this was found by Ybarra and Mitchell who noted that almost 40% of cyberbully/victims reported spending at least 3 hours a day online, whereas individuals not involved with online harassment (11.1%) spent less time (see also Twyman, Saylor, Taylor, & Comeaux, 2010). Additionally, several recent studies have found a link between cyberbullying victimization and perpetration and risky online behaviors (e.g., Bauman, 2010; Erdur-Baker, 2010; Wal- rave & Heirman, 2011). Individuals who reported giving out personal information to unknown people online or giving their password to a friend were more likely to be victims and perpetra- tors of cyberbullying.
Person Factor 7: Values and perceptions. Williams and Guerra (2007) observed a positive relationship between partici- pants’ moral approval of bullying and their involvement in perpe- trating not just cyberbullying but also physical and verbal bullying. Walrave and Heirman (2011) observed that individuals who per- petuate cyberbullying also tend to minimize the impact of their behavior on others. As with other types of aggressive behavior, perpetrators may engage in moral disengagement whereby they reframe their aggressive actions as more benign in intent, as less harmful in their consequences, or as emanating from reprehensible conduct on the part of the victim (Almeida, Correia, Marinho, & Garcia, 2012; Bandura, 1999; Bandura, Barbaranelli, Caprara, & Pastorelli, 1996; Bauman, 2010; Lazuras, Barkoukis, Ourda, & Tsorbatzou- dis, 2013). Previous research with traditional bullying has found that perpetrators are more likely than victims or those not involved in bullying to engage in moral disengagement (Menesini et al., 2003). Thus, to the extent that individuals have a tendency to morally disengage, one would expect them to be more likely to perpetrate cyberbullying as well.
Extending Bandura’s (1986) placement of moral disengagement within a social context, Bauman (2010) noted that “the technolog- ical world in which youth socialize may be a social context that promotes moral disengagement” (p. 808). In one of the few studies to date to examine moral disengagement and cyberbullying, Por- nari and Wood (2010) found that, indeed, moral disengagement positively predicted cyberbullying perpetration but not victimiza- tion. High levels of moral justification increased the likelihood that participants reported engaging in cyberbullying, whereas high levels of hostile attributional bias increased the odds of being a victim of cyberbullying. Almeida et al. (2012) found that moral justification was related to cyberbullying perpetration, but only among youth in seventh through ninth grades. For youth in tenth through 12th grades, moral justification was not differentially related to victim or perpetrator status.
Values and perceptions influencing victimization warrant addi- tional research attention. Just as perpetrators may justify their own actions by making negative aspersions to the character of the victim, so, too, victims may come to believe that they deserve their victimization status. This justification then alters the knowledge script with which the victim approaches social interactions.
Person Factor 8: Other maladaptive behavior. Individuals who engage in cyberbullying also more frequently engage in other maladaptive behaviors than do those not involved with cyberbul- lying. For example, in one study, online bully/victims and bullies reported significantly more frequent alcohol and tobacco use within the previous year than did individuals not involved with Internet harassment (Ybarra & Mitchell, 2004a). Ybarra and
Mitchell also found that online bully/victims and bullies reported more frequent problem behaviors including purposely damaging property, experiencing police contact, physically assaulting a non- family member, and taking something that did not belong to them within the past year than did victims and individuals not involved in Internet harassment. Truancy, poor grades, and fighting have been linked to cybervictimization (Hinduja & Patchin, 2008).
Situational Factor 1: Provocation and perceived support. Provocation can take a number of different forms including insults, verbal and/or physical aggression, and bullying. Thus, given the pattern of relationships observed with moral justification and the perpetration of cyberbullying, it is hardly surprising that involve- ment in traditional bullying also appears to be related to involve- ment in cyberbullying (Hemphill et al., 2012; Rivers & Noret, 2010; Twyman et al., 2010; Vandebosch & Van Cleemput, 2009; Ybarra & Mitchell, 2004a). In a mapping of the relationship between traditional bullying and cyberbullying with over 4,500 sixth through 12th graders, Kowalski, Morgan, and Limber (2012) found that higher rates of involvement in traditional bullying as victim and perpetrator were tied to higher rates of involvement in cyberbullying as victim and perpetrator, respectively. Of impor- tance, the estimates in the path analyses hinted at involvement in traditional bullying more often preceding involvement in cyber- bullying than vice versa.
Conversely, perceived support from peers and others may be negatively associated with cyberbullying perpetration and victim- ization. Fanti et al. (2012) found that ratings of social support from friends were associated with a decreased likelihood of engaging in cyberbullying (see also Calvete, Orue, Estévez, Villardón, & Pa- dilla, 2010). Support may also play a buffering role on the vic- timization side, as several studies have found that perceptions of support from peers are negatively related to reports of cybervictim- ization (Ubertini, 2011; Williams & Guerra, 2007).
Situational Factor 2: Parental involvement. An additional situational variable is parental involvement. Compared to those not involved in Internet harassment, people who engaged in Internet harassment reported weaker emotional bonds with their parents (defined as how well they get along, caregiver trust, discussing problems with caregiver when they are sad or in trouble, and frequency of having fun together), more frequent discipline by their parents, and less frequent parental monitoring of online activities (Ybarra & Mitchell, 2004a). Similar findings were re- ported by Wang et al. (2009), who found an inverse relationship between levels of parental support and involvement in cyberbul- lying as a perpetrator. Conversely, the prospect of punishment from parents acts as a deterrent to cyberbullying perpetration (Hinduja & Patchin, 2013).
On the cybervictimization side, researchers have identified a negative relationship between parental control of technology and cybervictimization (Aoyama, Utsumi, & Hasegawa, 2012). Addi- tionally, others have found that parental discussions about online behavior and knowledge of the general whereabouts of their chil- dren are associated with less frequent cybervictimization (Taiariol, 2010; Wade & Beran, 2011).
Situational Factor 3: School climate. Perceived support does not have to originate just with parents. Williams and Guerra (2007) found that individuals who perceive themselves as connected to their school and who perceive the climate as being trusting, fair, and pleasant report less perpetration of verbal and physical bully-
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
41CYBERBULLYING REVIEW AND META-ANALYSIS
ing as well as cyberbullying (see also Calmaestra-Villen, 2011; Cappadocia, 2009; Taiariol, 2010). Inhospitable school climates can create frustration and discomfort among some students, and in response to these feelings, students may act aggressively through cyberbullying. Likewise, because of the greater propensity for cyberbullying perpetration, negative school climates may increase susceptibility to online victimization, particularly among students.
Situational Factor 4: Perceived anonymity. One additional input factor related to the perpetration of cyberbullying is per- ceived anonymity. Kowalski and Limber (2007) observed that just under 50% of their middle school respondents who had been victims of cyberbullying did not know the identity of the perpe- trator. Ybarra, Diener-West, and Leaf (2007) noted that 12.6% of victims of frequent Internet harassment did not know the identity of the person who was harassing them. As noted earlier, perceived anonymity on the part of perpetrators opens up the pool of indi- viduals who might consider engaging in cyberbullying. Addition- ally, perceived anonymity leads to a disinhibition effect that leads people to say and do things anonymously that they would not consider saying and doing in face-to-face interactions.
Routes
According to the GAM, the person and situational inputs dis- cussed above influence social, cognitive, emotional, and behav- ioral outcomes via three direct routes: cognition, affect, and arousal. This process is consistent with the cyberbullying perpe- tration GAM (see Figure 1); however, in the GAM for cyber- victimization, these three routes are experienced after the occur- rence of a cyberbullying encounter. This intermediary step is introduced because, whereas both person and situational factors can increase an individual’s susceptibility to becoming victimized, until the cyberbullying event has occurred, the internal states of cyberbullying victims will not be influenced. Nevertheless, we posit that the same three internal states serve as routes for both cyberbullying GAM models (see Anderson & Bushman, 2002).
In both the cyberbullying perpetration and victimization GAMs, after taking into account person and situational inputs and internal states, an individual then engages in appraisal and decision-making processes. This stage of the GAM is labeled as proximal processes in Figure 1.
Proximal Processes
As stated by Anderson and Bushman (2002, p. 40), “Results from the inputs enter into the appraisal and decision processes through their effects on cognition, affect, and arousal.” These processes can be either short term (i.e., proximal) or long term (i.e., distal). The proximal processes stage in the GAM focuses on appraisal and decision-making processes within a cyberbullying situation and differs from the longer term negative outcomes researchers typically think of when the word outcome is used (e.g., depression, anxiety, behavioral problems). These longer term neg- ative behavioral and psychological outcomes may occur if an individual is exposed to cyberbullying encounters repeatedly as a victim or perpetrator, to be discussed further in the Distal Out- comes section below. The proximal processes included here con- sist of appraisal and decision-making processes, both automatic and controlled, that influence behavioral decisions.
After undergoing an appraisal process, individuals engage in either thoughtful or impulsive responses. For instance, if a cyber- bullying encounter is perceived as stressful on the basis of the internal state of the victim, and an individual does not have sufficient resources (cognitive, emotional, or otherwise) to deal with the situation, he or she may then engage in an impulsive (i.e., automatic) response to the situation, such as sending a cyberbul- lying message back to the perpetrator. If, on the other hand, the individual feels there are sufficient resources available, he or she may give a more thoughtful (i.e., controlled) behavioral response. As such, differences in reappraisal strategies may account for variations in behavioral responses. That is, it may help explain why some individuals do nothing or call for help when a person cyberbullies them, whereas others respond by engaging in cyber- bullying in response to victimization. The same appraisal and decision-making stages also apply to the cyberbullying perpetra- tion GAM. Noteworthy, the original GAM posited by Anderson and Bushman (2002) does not consider more introspective actions and ways of coping with the situation, as well as more distal outcomes of the cyberbullying encounter. Obtaining a broader understanding of the appraisal process may provide insight into additional outcomes that may be associated with a cyberbullying encounter (such as seclusion or self-inflicted harm). Cyberbullying researchers have begun to examine some of these more distal outcomes, as is discussed below.
Distal Outcomes
The experience of traditional bullying and cyberbullying is associated with a number of negative outcomes for victims and perpetrators in regard to psychological and physical health, social functioning, and behavior.4 Studies have linked cyberbullying involvement as victim and/or perpetrator to tobacco, alcohol, and drug use (Ybarra & Mitchell, 2004a); mental health symptomatol- ogy of anxiety and depression (Didden et al., 2009; Perren, Dooley, Shaw, & Cross, 2010; Ybarra & Mitchell, 2004a); de- creased self-esteem and self-worth (Didden et al., 2009); low self-control (Vazsonyi, Machackova, Ševčíková, Šmahel, & Cerna, 2012); suicidal ideation (Hinduja & Patchin, 2010; Schenk & Fremouw, 2012); poor physical health (Kowalski & Limber, 2013); increased likelihood of self-injury (Kessel Schneider et al., 2012); and loneliness (Şahin, 2012).
Additionally, victims of cyberbullying are much more likely than nonvictims to be victims of traditional bullying (Hinduja & Patchin, 2008; Katzer et al., 2009; Kowalski, Morgan, & Limber, 2012). Ybarra and Mitchell (2004b) found that aggressor/targets of cyberbullying tend to have poor emotional bonds with their par- ents. Still other research found that bully/victims of cyberbullying are much more likely to think that it is acceptable to retaliate after being cyberbullied than are nonvictims (O’Brennan et al., 2009).
Finally, both victims and perpetrators of cyberbullying are more likely than nonvictims to experience impaired performance at
4 We have used the term “outcomes” to refer to behavioral and psycho- logical phenomena that are traditionally thought to result from perpetrating cyberbullying or cybervictimization. However, it should be noted that because all of the studies included in the meta-analysis were cross- sectional, no causal claims can be made; rather, the variables are simply correlated.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
42 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
school and in the workplace (Holfeld & Grabe, 2012; Kowalski, Limber, & Agatston, 2012; Vazsonyi et al., 2012). In a school setting, victims and perpetrators of cyberbullying are more likely to be absent from school, receive low grades, and experience poor concentration (Beran & Li, 2005, 2007; Vazsonyi et al., 2012). Ybarra, Diener-West, and Leaf (2007) found that students being harassed online also tended to have more detentions and suspen- sions, incidences of truancy, and weapon carrying.
Differing Paths by Bully/Victim Status
The path that an individual takes through the stages of the GAM may differ depending on whether he or she is a victim or perpe- trator, as noted in Figure 1. However, one of the useful things about applying this model to cyberbullying is that it can help to explain how a cybervictim can become a cyberbully (as indicated by the dashed line in the figure).
Cyberperpetration. The path to a cyberbullying encounter for a perpetrator starts with person and situational factors. These factors affect the present internal state of the individual, perhaps activating hostile thoughts, negative affect, and heightened arousal. The present internal state is also linked with appraisal and decision processes. For example, the individual may appraise the situation as one in which an aggressive response is appropriate and decide to engage in an impulsive action by quickly sending a nasty text message to another individual. Alternatively, if the individual appraises the situation as not demanding an immediate, impulsive action, he or she may decide that a more thoughtful action is appropriate and decide to create a webpage that berates another individual. This cyberbullying behavior can feed into the person and situational inputs, perhaps reinforcing an aggressive person- ality, and provoking another individual to engage in a similar encounter. Additionally, engaging in these types of encounters over time may be linked with distal outcomes, such as decreased popularity among one’s peer group or decreased performance in school, which can in turn affect individual and situational factors (e.g., by resulting in maladaptive behavior such as drug use or influencing one’s values).
Cybervictimization. The path to a cyberbullying encounter for a victim also starts with person and situational factors. This combination of person and situational factors might predispose a young boy, for example, to become a cybervictim. After he re- ceives a cyberbullying message, this encounter creates a number of possible internal states, such as worried thoughts, negative affect, and heightened arousal, and the cyberbullying encounter can also influence person and situational factors (e.g., higher anxiety and a more negative school climate). The present internal state is linked with appraisal and decision processes, and perceptions of the encounter as stressful and beyond personal control may lead to an impulsive action to drink alcohol or skip school or a more con- trolled response, such as plotting revenge against the original perpetrator in a face-to-face context. The victim’s response can then feed back into person and situational factors (e.g., previous engagement in maladaptive behavior and provocation, respec- tively), which may affect future encounters with cyberbullying perpetration or cybervictimization.
Whereas the GAM provides a viable theoretical foundation for the cyberbullying perpetration and victimization processes, studies examining the relations between cyberbullying and both inputs and
outcomes have reported a range of correlations for each effect (e.g., r � .03 to r � .51 for the relationship between cyberbullying victimization and depression), suggesting that results may be sam- ple specific. Therefore, to further summarize extant cyberbullying research, we conducted a series of meta-analyses on the available studies, as described below.
The Current Study
In reviewing the literature on cyberbullying, we identified nu- merous correlates of cyberbullying perpetration (CB), including 10 risk factors that might demonstrate a positive relationship with CB (e.g., normative beliefs about aggression and risky online behav- ior; see Table 2 for a complete list), five protective factors that might be negatively related to CB (including empathy and parental monitoring), and seven variables that might be thought of as outcomes of cyberbullying perpetration (including academic achievement and depression). Additionally, we identified a num- ber of correlates of cyberbullying victimization (CV), including nine risk factors that might be positively related to CV (including hyperactivity and moral disengagement; see Table 3 for a complete list), seven variables that might be thought of as protective factors, in that they will be negatively related to CV (including empathy and parental monitoring), and 13 variables that might be thought of as outcomes of experiencing CV (including drug and alcohol use and suicidal ideation). Therefore, the first research question to be addressed by the meta-analysis pertains to the strength of the relationships between each of the behavioral and psychological variables identified above and CB or CV.
In addition to exploring the constellation of behavioral and psychological correlates of CB/CV, we sought to understand whether these relationships are moderated by measurement fea- tures or sample characteristics. We asked in particular, whether the size of CB/CV relationships is affected by the publication status of the manuscript; the time parameter provided with the measure of CB/ CV; grade level, gender composition, or country of origin of the sample; whether CB/CV is measured with one item versus multi- ple items; whether a definition for bullying/cyberbullying or the word “bully” is provided; and whether traditional bullying/victim- ization is also measured.
Meta-Analysis Method
Literature Search
Four methods were used to search for relevant studies. First, we performed searches of 14 databases: Academic Search Complete, Business Source Complete, Communication & Mass Media Com- plete, Criminal Justice Abstracts, Education Research Complete, Family Studies Abstracts, HealthSource: Nursing/Academic Edi- tion, Human Resources Abstracts, MEDLINE, PsycARTICLES, PsycINFO, SocINDEX, Social Sciences Full Text, Pro-Quest Dis- sertations and Theses Full-text, and Web of Science. The search terms included variants of online behavior (cyber� or Internet or net or web� or online or chat or electronic), and variations on perpetration or victimization (harass� or bully� or victim� or per- petrat�). We also used the following limiters to exclude any studies dealing with stalking or sexual victimization (NOT sex�, NOT stalk�). Additionally, in a separate search, we added terms for
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
43CYBERBULLYING REVIEW AND META-ANALYSIS
various outcomes of interest (depress� or esteem� or anxi� or lonel�
or satis� or stress or somatic or symptom� or health). Second, we searched the reference lists of existing reviews of cyberbullying (e.g., Slonje, Smith, & Frisén, 2013; Tokunaga, 2010; von Marées & Petermann, 2012). Third, we searched the in-press or online first sections of the following journals: Aggressive Behavior; British Journal of Developmental Psychology; Computers in Human Be- havior; Cyberpsychology, Behavior, and Social Networking; De- velopmental Psychology; European Journal of Developmental Psychology; Journal of Adolescence; Journal of Adolescent Health; Journal of School Psychology; Journal of School Violence; Journal of Youth and Adolescence; New Media & Society; School Psychology International; School Psychology Quarterly; School Psychology Review. Fourth and finally, we contacted active re- searchers for unpublished studies or conference presentations. We identified a total of 1,365 studies in the initial search.
Inclusion and Exclusion Criteria
To be included in this meta-analysis, studies had to meet the following criteria: (a) the article must have been an empirical study (i.e., review or conceptual articles, articles reporting the results of an intervention, and qualitative studies were excluded); (b) it must have included a self-report measure of CB or CV and a measure of one of the predictors or outcomes mentioned below; (c) CB or CV must have been measured with at least one item on an ordinal/ interval scale (i.e., studies with “yes/no” measures were excluded); (d) the measure must have asked participants to report general experiences with bullying in the past (rather than in regard to a
specific incident or a hypothetical situation); (e) participants in the study must have been students in middle school, high school, or college (rather than educators or parents). We did not restrict the time range in which studies had to be conducted, and we included studies that had been published or were in-press as of October 2012.
Pearson’s r was used as a measure of effect size to indicate both the direction and strength of the relationships between CB/CV and predictors/outcomes. CB/CV measures included Internet harass- ment, text message bullying/victimization, measures of CB/CV adapted directly from traditional bullying measures (e.g., Olweus Bully/Victim Questionnaire; see Katzer et al., 2009; Kowalski & Limber, 2007; Slonje et al., 2012), and many new measures of CB/CV (e.g., the Cyberbullying Questionnaire of Ang & Goh, 2010; the Cyberbullying Scale of Erdur-Baker & Kavşut, 2007; the Personal Experiences Checklist of Hunt et al., 2012; the Cyber- bully Survey of Li, 2007b; the Cyberbullying Scale of Menesini et al., 2011; the Berlin Cyberbullying/Cybervictimization Question- naire of Schultze-Krumbholz & Scheithauer, 2009a; and the Youth-Reported Internet Harassment Survey of Ybarra, Diener- West, & Leaf, 2007). We obtained correlations of CB/CV with a variety of variables including risk factors (e.g., anger, moral dis- engagement, normative beliefs about aggression, frequency of Internet use, risky online behavior), protective factors (e.g., paren- tal monitoring, school climate, school safety), cyberbullying out- comes (e.g., academic achievement, anxiety, depression, drug/ alcohol use, life satisfaction, and self-esteem), demographic variables (e.g., gender, country of origin, school grade level), and
Table 2 Results of the Primary Meta-Analyses for Cyberbullying Perpetration
Measure N k r� CI [95%] Q I2
Risk factors 1. Cybervictimization 147,434 91 0.51 [0.48, 0.55] 7,732.52��� 98.8% 2. Traditional bullying 136,105 70 0.45 [0.41, 0.48] 4,952.13��� 98.6% 3. Traditional victimization 126,264 61 0.21 [0.18, 0.23] 987.41��� 93.8% 4. Age 52,105 31 0.05 [0.03, 0.08] 203.01��� 84.7% 5. Frequency of Internet use 6,764 12 0.20 [0.12, 0.28] 118.35��� 89.9% 6. Moral disengagement 3,549 7 0.27 [0.20, 0.34] 20.81�� 66.4% 7. NOBAG 6,454 7 0.37 [0.24, 0.48] 145.08��� 95.2% 8. Anger 5,088 5 0.20 [0.17, 0.22] 13.86�� 63.9% 9. Risky online behavior 3,114 5 0.23 [0.20, 0.26] 42.06��� 88.1% 10. Narcissism 2,126 3 0.22 [0.18, 0.26] 0.56 0.0%
Protective factors 11. Empathy 5,031 5 �0.12 [�0.14, �0.09] 0.78 0.0% 12. Parental monitoring 1,567 5 �0.07 [�0.13, �0.03] 17.86�� 72.0% 13. Perceived support 8,619 5 �0.04 [�0.06, �0.02] 11.30� 55.8% 14. School climate 7,079 4 �0.12 [�0.14, �0.10] 3.93 0.0% 15. School safety 3,486 4 �0.13 [�0.16, �0.10] 5.55 27.9%
Outcomes 16. Depression 19,820 16 0.15 [0.11, 0.19] 101.48��� 84.2% 17. Self-esteem 21,342 15 �0.10 [�0.13, �0.07] 51.61��� 70.9% 18. Anxiety 5,295 8 0.16 [0.07, 0.25] 64.87��� 87.7% 19. Loneliness 18,012 8 0.09 [0.04, 0.13] 53.37��� 85.0% 20. Drug and alcohol use 6,801 6 0.27 [0.22, 0.31] 18.27�� 67.2% 21. Academic achievement 8,155 6 �0.09 [�0.18, �0.01] 83.45��� 92.8% 22. Life satisfaction 3,417 3 �0.11 [�0.14, �0.08] 16.02��� 81.3%
Note. Fixed effects analyses are reported for analyses with k � 5 effect sizes, whereas those with k � 5 are based on random effects analysis. r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity; I2 � Higgins and Thompson’s (2002) measure of heterogeneity; NOBAG � normative beliefs about aggression. � p � .05. �� p � .01. ��� p � .001.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
44 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
involvement in traditional forms of bullying perpetration or vic- timization (TB and TV, respectively).
Sample of Studies
After coding the studies meeting the inclusion criteria (i.e., 131 studies), we created an independent set of effect sizes, ensuring that each correlation from a given sample was represented only once in the analysis. For longitudinal studies that reported corre- lations among study variables for several different measurement occasions, we took the arithmetic mean of the correlations across all years reported. Therefore, because all of the included studies were cross-sectional, results of the meta-analysis are best thought of as associations, rather than causal claims. Additionally, to avoid undue influence, findings that were reported across multiple pub- lications were included only once within the analysis. This resulted in 137 unique data sets providing 736 independent effect sizes. Out of the 131 papers, 102 (77.9%) were published journal articles, 20 (15.3%) were unpublished master’s theses or doctoral disserta- tions, 7 (5.3%) were book chapters, and 2 (1.5%) were unpub- lished data sets that were provided by study authors. See the
References section for a list of the studies used in the meta- analysis.
Coding of Studies
We coded the following pieces of information from each paper identified for inclusion in the meta-analysis: effect sizes, sample size, the number of items in each measure, and the reliability of each measure. Additionally, based on prior research on CB, the following moderator variables were also coded for each study: percent of sample that was female (as a continuous variable); publication status (published vs. unpublished); school grade level of the sample (middle school only, middle and high school, high school only, college); country of origin for the sample (North America vs. Europe/Australia vs. Asia); reporting time frame provided with CB/CV measurement (none provided; within the previous 3 months; more than 3 months ago); whether the measure of CB/CV contained a single item or multiple items; whether a CB definition or the word “bully” was provided with the measure of CB/CV; and, finally, whether TB or TV was also measured. Whereas many studies reported using a multi-item measure to
Table 3 Results of the Primary Meta-Analyses for Cyberbullying Victimization
Measure
Cyberbullying victimization
N k r� CI [95%] Q I2
Risk factors 23. Traditional victimization 164,280 81 0.40 [0.37, 0.42] 2,936.01��� 97.2% 24. Traditional bullying 128,642 61 0.25 [0.23, 0.28] 1,100.04��� 94.5% 25. Age 52,782 32 0.01 [�0.01, 0.04] 180.96��� 82.3% 26. Frequency of Internet use 5,427 12 0.17 [0.11, 0.22] 33.96�� 64.7% 27. Social anxiety 13,408 9 0.15 [0.10, 0.19] 34.01��� 73.5% 28. Moral disengagement 2,655 5 0.15 [0.11, 0.18] 6.89 27.4% 29. Risky online behavior 3,300 5 0.18 [0.14, 0.21] 44.29��� 88.7% 30. Anger 3,211 4 0.20 [0.16, 0.23] 0.63 0.0% 31. Hyperactivity 10,560 3 0.11 [0.09, 0.13] 0.28 0.0%
Protective factors 32. Social intelligence 3,849 6 �0.08 [�0.15, �0.02] 14.54� 58.7% 33. School safety 3,975 5 �0.22 [�0.24, �0.19] 5.85 14.5% 34. Parental monitoring 2,771 5 �0.06 [�0.10, �0.02] 15.16�� 67.0% 35. Perceived support 5,569 5 �0.08 [�0.11, �0.06] 16.29�� 69.3% 36. Empathy 5,928 4 0.02 [�0.01, 0.04] 15.92�� 74.9% 37. School climate 7,079 4 �0.11 [�0.14, �0.09] 7.61 47.4% 38. Parental control of technology 1,751 3 �0.01 [�0.06, 0.04] 8.54� 64.9%
Outcomes 39. Depression 55,929 30 0.24 [0.21, 0.27] 236.15��� 87.3% 40. Self-esteem 29,201 21 �0.17 [�0.21, �0.13] 206.36��� 89.8% 41. Anxiety 7,450 14 0.24 [0.18, 0.31] 97.37��� 85.6% 42. Academic achievement 9118 9 �0.06 [�0.13, 0.01] 79.51��� 88.7% 43. Loneliness 16,653 8 0.24 [0.15, 0.33] 174.35��� 95.4% 44. Life satisfaction 5,315 7 �0.21 [�0.28, �0.14] 35.78��� 78.8% 45. Drug and alcohol use 5,975 6 0.15 [0.08, 0.21] 28.25��� 80.4% 46. Conduct problems 11,234 4 0.19 [0.18, 0.21] 3.71 0.0% 47. Emotional problems 9,614 3 0.18 [0.16, 0.20] 1.54 0.0% 48. Prosocial behaviors 10,560 3 �0.05 [�0.06, �0.03] 8.01� 62.5% 49. Somatic symptoms 2,354 3 0.19 [0.15, 0.23] 9.78�� 69.3% 50. Stress 1,519 3 0.34 [0.29, 0.38] 23.58��� 87.3% 51. Suicidal ideation 2,995 3 0.27 [0.24, 0.31] 11.98�� 75.0%
Note. Fixed effects analyses are reported for analyses with k � 5 effect sizes, whereas those with k � 5 are based on random effects analysis. r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity; I2 � Higgins and Thompson’s (2002) measure of heterogeneity. � p � .05. �� p � .01. ��� p � .001.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
45CYBERBULLYING REVIEW AND META-ANALYSIS
assess CB/CV, it was clear upon further investigation that in some cases only one of these items measured CB/CV prevalence (i.e., other items assessed constructs such as the venue through which CB occurred or who perpetrated the CB). Therefore, we coded studies that utilized a single item to assess the frequency of CB/CV behavior as utilizing single-item measures and those containing more than one item as employing multi-item measures.
A handful of studies did not indicate the specific mean age of the sample or the number of females in the sample, and so these data fields were left blank. In the final meta-analytic data set, the total amount of data missing on moderator variables was minimal (0.7%). Thus, we dealt with missing data by using listwise deletion in the moderator analyses (Pigott, 2009).
All articles were coded by the second author of this article. In addition, a random sample of 42 studies (i.e., 33% of the studies) was coded for the moderator variables outlined above by the third author in order to determine interrater agreement. Interrater agree- ment (�) ranged from .70 to 1.00, with the average � � .92. In cases where ratings were not in agreement, the two raters discussed the articles and came to consensus.
Meta-Analytic Procedure
We conducted the meta-analysis using effect sizes that were transformed using Fisher’s Zr and using study weights with � � n – 3 (see Lipsey & Wilson, 2001). Effect sizes were then trans- formed back into correlations when reporting the results of the analyses for ease of interpretation. The analyses were completed in SPSS, and we utilized the SPSS macros provided by Daniel Wilson for computing the mean effect size and examining mod- erators (see Lipsey & Wilson, 2001, Appendix D). Prior to con- ducting the main analyses, we checked for outliers on effect size variables. No statistical outliers were found on the effect size variables, so the full data set was used in subsequent analyses.
For the effect size and moderator analyses, we used a mixed- effects model because we assumed that the variance beyond participant-level sampling error was composed partly of identifi- able factors (i.e., the identified moderators above) and partly of random sources that could not be identified (Lipsey & Wilson, 2001). Additionally, researchers have demonstrated that meta- analyses conducted with fixed effects models tend to make con- siderably more Type I errors than if the analysis had been run with a random effects model (of which mixed effects models are a member; Hunter & Schmidt, 2004). Additionally, the confidence intervals for the mean effect size estimates are likely to be too narrow with fixed effects models, thus exaggerating the level of accuracy in the results (Hunter & Schmidt, 2004). However, re- sults of random effects meta-analysis are reliable only when the number of independent samples is greater than five (Hedges & Vevea, 1998). Therefore, a fixed effects model was utilized for effect sizes based on five or fewer samples. In estimating the random effects variance component for the mixed-effects model when conducting moderator analyses, we used the restricted max- imum likelihood method, as this method of estimation typically provides more accurate estimates than other commonly used ap- proaches (Lipsey & Wilson, 2001; Viechtbauer, 2005).
The first step in the meta-analyses involved calculating weighted mean effect sizes with 95% confidence intervals and testing for homogeneity of effect size distributions. Then, we
conducted a series of moderator analyses to determine how effect sizes might differ depending on a predetermined set of study characteristics (as outlined above). We used the SPSS macros and formulas from Lipsey and Wilson (2001) to test the significance of the categorical moderators using an analog to analysis of variance and weighted regression analysis to test the significance of the continuous moderator variable (i.e., proportion of females in the sample).
Meta-Analysis Results
Tables 2 and 3 display mean weighted effect sizes (r�), sample size (N), number of independent correlation coefficients (k), and total homogeneity statistics (Q and I2) for predictor/outcome rela- tionships with CB and CV. Additionally, visual displays of effect sizes can be seen in Figures 2 and 3 as forest plots. The results can be interpreted with the aid of Cohen’s (1992) guidelines for correlations (.10 � small or weak; .30 � medium or moderate; .50 � large or strong). As seen in Table 2, experiencing CV strongly positively related to being a perpetrator of CB (r � .51). Additionally, being a perpetrator of bullying in traditional ways (e.g., face-to-face in school or other contexts) was moderately positively related to being a perpetrator of CB (r � .45), as suggested by several previous researchers (e.g., Kowalski, Mor- gan, & Limber, 2012), but CB had a smaller relationship with traditional victimization (r � .21). Other moderately (or near moderately) sized relationships were uncovered as predictors of engagement in CB, including normative beliefs about aggression (r � .37) and moral disengagement (r � .27). Small positive relationships were found for risky online behavior (r � .23), narcissism (r � .22), frequency of Internet use (r � .20), and anger (r � .20). Small negative relationships were found between CB perpetration and school safety (r � –.13), empathy (r � –.12), school climate (r � –.12), and parental monitoring (r � –.07), highlighting the small, but significant protective role of each of these variables. Finally, results indicate that there was a very small negative relationship between CB perpetration and perceived sup- port (r � –.04).
In terms of outcomes, being a perpetrator of CB was nearly moderately associated with drug and alcohol use (r � .27).5
Somewhat smaller relationships were found for anxiety (r � .16) and depression (r � .15). Perpetrators of CB were also more likely to report low life satisfaction (r � –.11), self-esteem (r � –.10), and academic achievement (r � –.09) and higher levels of lone- liness (r � .09), but each of these relationships was small in magnitude. Somewhat surprisingly, there was only a very weak
5 Because traditional bullying and cyberbullying co-occur for some individuals, although certainly not all, one issue that researchers must address is the extent to which negative effects purported to result from cyberbullying are, indeed, attributable to cyberbullying and not to involve- ment with traditional bullying. Olweus (2012, p. 534) summed up this issue well when he stated, “Reporting about or researching negative effects of cyberbullying should not be done without taking the possible, co-existing negative effects of traditional bullying into account in one way or another. And if the research is focused on bullying, it is quite essential to study the phenomenon in a context of bullying (and not without context or in a context of being victimized or exposed to negative or aggressive behaviour more generally).” One way to determine the unique effects of cyberbully- ing above and beyond traditional bullying is to conduct hierarchical linear regressions on data sets that measure involvement in both types of bullying.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
46 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
positive relationship between age and CB (r � .05). Confidence intervals did not include zero for any of the aforementioned relationships, indicating that each effect size was significantly different from zero.
As shown in Table 3, the strongest predictor of CV was TV (r � .40), indicating that youth who are bullied face-to-face are also likely to be bullied online. It also appears that individuals who are cybervictims are more likely to engage in perpetrating traditional bullying (r � .25). Similar to CB perpetration correlates, other risk factors for experiencing CV include anger (r � .20), risky online behavior (r � .18), frequency of Internet use (r � .17), social anxiety (r � .15),6 moral disengagement (r � .15), and hyperac- tivity (r � .11). Each of these effect sizes is small in strength.
A number of protective factors for CV were also identified in the meta-analysis, including school safety (r � –.22), school climate (r � –.11), social intelligence (r � –.08), perceived support (r � –.08), and parental monitoring (r � –.06). Each of these effect sizes was significantly different from zero. In contrast, the relationships between CV and empathy (r � .02), age (r � .01), and parental control of technology (r � –.01) were nonsig- nificant.
Individuals who reported high levels of CV also tended to report high levels of stress (r � .34), suicidal ideation (r � .27), depres- sion (r � .24), anxiety (r � .24), loneliness (r � .24), somatic symptoms (r � .19), conduct and emotional problems (r � .19 and
r � .18, respectively), and drug and alcohol use (r � .15), as well as reduced life satisfaction (r � –.21), self-esteem (r � –.17), and prosocial behaviors (r � –.05). The association between CV and academic achievement (r � –.06) was nonsignificant.
Results of Moderator Analyses
With the exception of four variables in the CB meta-analyses and seven variables in the CV analyses, there was significant between-study variability in the effect size distributions (as indi- cated by a significant Q and a large I2; see Tables 2 and 3), suggesting the presence of moderators. When there were sufficient data (i.e., k � 3 in each subgroup; Borenstein, Hedges, Higgins, & Rothstein, 2009), the analog to analysis of variance (ANOVA) was conducted to examine the impact of the seven categorical moder-
6 Social anxiety was considered as a risk factor and anxiety an outcome for the following reasons. Social anxiety deals with nervousness/shyness in interactions with other people. Anxiety, on the other hand, deals with general feelings of nervousness. In our conceptualization, those experienc- ing social anxiety would appear timid and might be the target of greater amounts of cyberbullying; thus, it was labeled a risk factor. With regard to anxiety, we felt that one possible reaction to experiencing cybervictimiza- tion is to feel frightened of the bully or, from the bully’s perspective, be worried about being retaliated against by the victim. Therefore, we con- ceptualized anxiety as an outcome of a bullying encounter.
Figure 2. Forest plot for meta-analytic correlates of cyberbullying perpetration, displaying r� and 95% confidence intervals.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
47CYBERBULLYING REVIEW AND META-ANALYSIS
ator variables (publication status, reporting time frame, grade level, country of origin, single- vs. multiple-item measurement, provision of a bullying definition or the word “bully,” and co- measurement of traditional bullying). Additionally, weighted re- gression analyses were conducted to examine the moderating role of gender when the number of samples was greater than 10 (Borenstein et al., 2009), as smaller numbers of studies are likely to produce unstable results. Out of the 51 possible relationships examined in the current meta-analyses, 28 of these relationships could not be tested for moderation as they did not meet the minimum samples criteria, as noted above (these include the following relationships from Tables 2 and 3: 8–15, 20, 22, 28–38, and 45–51). This left 23 possible relationships to explore with the moderator analyses below.
Sufficient data for 17 constructs were available to examine the moderating role of publication status (including the following variables from Tables 2 and 3: 1–4, 16, 17, 23–27, 39–44). Results of mixed effects ANOVA revealed that publication status did not moderate any of the available relationships. In addition to examining publication status as a moderator, we further explored the possible impact of publication bias in several ways. First, we included unpublished works in our meta-analyses (including dis- sertations, theses, and unpublished data sets), which comprised
16.8% of the total number of effect sizes. Second, we did not restrict our analyses to the primary variables studied in each article but rather included many other correlates and covariates that may not have been part of the original study hypotheses (e.g., frequency of Internet use, age). Finally, following the procedures outlined in Sowislo and Orth (2013), we tested for publication bias to see whether effect sizes based on unpublished data differed signifi- cantly from effect sizes based on published studies for all meta- analyses where at least 10 studies were available (14 variables had sufficient data, as shown in Tables 2 and 3). Results of indepen- dent samples t tests revealed that there were no significant differ- ences in effect sizes between published and unpublished studies (all ps � .10). Therefore, publication bias does not appear to be an issue with this study.
Next, we examined the moderating role of reporting time frame. Results of a mixed effects ANOVA revealed that reporting time frame did not moderate any of the relationships among the 12 constructs for which data were available (including variables 1–5, 17, 23–26, 39, and 40 from Tables 2 and 3). The remaining five moderator variables are discussed in the sections that follow.
Grade level. Given the small number of studies that examined college students (k � 8) or a combination of high school and college students (k � 4), these samples were left out of this
Figure 3. Forest plot for meta-analytic correlates of cyber victimization, displaying r� and 95% confidence intervals. NOBAG � Normative Beliefs about Aggression.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
48 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
moderator analysis. The remaining categories included samples that contained middle school students only (k � 41), middle school and high school students (k � 42), or high school students only (k � 38). There were sufficient data to examine 11 constructs with mixed effects ANOVA (these include variables 1–4, 17, 23–25, and 39–41 from Tables 2 and 3). Results revealed no moderating effect of grade level for the relationships between CV and depres- sion, self-esteem, anxiety, age, and TB, nor between CB and self-esteem, age, TV, TB, and CV. Significant between-group Q statistics were found for the relationship between CV and TV (QBG � 6.31, p � .05). Table 4 presents the results of this moderator analysis. Namely, for CV, a lower weighted average correlation was found with TV for middle school (r�� .37) and high school (r�� .36) samples than for samples containing both middle school and high school students (r�� .46). However, it should be noted that the confidence intervals (CIs) overlap for these different groups, suggesting a relatively low level of heter- ogeneity in these effect sizes and indicating that the differences between these weighted average correlations, while significant, are relatively small in magnitude.
Country of origin. Given the small number of studies that were conducted in Asia in our sample of studies (k � 7; see Table 1), effect sizes from this region were left out of this moderator analysis. Additionally, because the number of effect sizes was relatively small for samples from Australia, we aggregated Europe and Australia into one group (k � 68) for comparison with North American samples (containing studies from the United States or Canada; k � 56). There were sufficient data to examine 15 constructs with mixed effects ANOVA (including variables 1–4, 6, 16, 17, 19, 23–26, 39, 40, and 43 from Tables 2 and 3). No moderating effect was found for the relationships between CV and depression, age, and frequency of Internet use, nor between CB and depression, loneliness, moral disengagement, age, TB, and CV. As shown in Table 5, significant between-group Q statistics were found for the relationship between CV and loneliness (mean difference � .23, QBG � 7.50, p � .01), TB (mean difference � .10, QBG � 13.02, p � .01), self-esteem (mean difference � .08, QBG � 7.29, p � .01), and TV (mean difference � .08, QBG � 5.45, p � .05). Additionally, significant between-group Qs were found between CB and TV (mean difference � .08, QBG � 8.13, p � .01) and self-esteem (mean difference � .07, QBG � 7.13, p � .01). For all of these relationships, the effect sizes were smaller in
European/Australian samples than in North American samples. However, it should be noted that the CIs overlap for all factors except for the relationship between CV and traditional bullying.
Single- vs. multiple-item measurement. Sufficient data were available for 15 constructs to examine the moderating role of number of items (including variables 1–4, 16, 17, 21, 23–25, 27, and 39–42 from Tables 2 and 3). We compared studies that utilized a single item to measure frequency of CB/CV (k � 36) to studies that utilized multiple items to index CB/CV (k � 98). Results of mixed effects ANOVA revealed no moderating effect for the relationships between CV and depression, self-esteem, anxiety, academic achievement, age, TV, and TB. With the excep- tion of anxiety, these constructs were also not significant when their relations were examined with CB. As shown in Table 6, significant variability was explained by the moderating role of number of items in CV measures and CB (mean difference � .15, QBG � 11.64, p � .01) and social anxiety (mean difference � .09, QBG � 4.52, p � .05), but confidence intervals overlap for social anxiety. In both cases, the relationships were smaller when CV was measured with a single item.
Provision of a (cyber)bullying definition or the word “bully.” For the next moderator analysis, we compared studies that provided a bullying or cyberbullying definition or the word “bully” with the measurement of CB/CV (k � 73) to those studies that included neither a definition nor the word “bully” (k � 60). Mixed effects ANOVA could be conducted on 18 constructs with sufficient data (these included the following variables from Tables 2 and 3: 1–6, 16, 17, 19, 23–26, 39–41, 43, and 44). No significant moderating role was found for the relationships between CV and depression, loneliness, self-esteem, anxiety, life-satisfaction, fre- quency of Internet use, TV, and TB, nor between CB and depres- sion, loneliness, self-esteem, moral disengagement, frequency of Internet use, and TB. The moderator did explain significant vari- ability in the relationships between CV and age (mean differ- ence � .05, QBG � 4.07, p � .05), as well as the relationships between CB and CV (mean difference � .09, QBG � 7.92, p � .01), TV (mean difference � .06, QBG � 5.34, p � .05), and age (mean difference � .05, QBG � 3.99, p � .05; see Table 7). In each case, providing a definition or the word “bully” with the measurement of CB/CV resulted in smaller correlations. As with other moderator analyses, the CIs for these analyses overlap.
Measurement of traditional bullying. The final categorical moderator variable dealt with whether TB or TV was also mea- sured in the study along with CB/CV (k � 96) or not (k � 38). There were sufficient data to examine this moderating variable for 12 constructs (including variables 1, 4, 5, 7, 16, 17, 25, 26, 39–41, and 43 from Tables 2 and 3). Results of the mixed effects ANOVA revealed no significant moderating role for the relationships be- tween CV and depression, loneliness, self-esteem, anxiety, age, and frequency of Internet use, nor between CB and self-esteem, age, frequency of Internet use, and normative beliefs about aggres- sion (see Table 8). The moderator explained significant variability in the relationships between CB and depression (mean differ- ence � .13, QBG � 6.75, p � .01) and CV (mean difference � .13, QBG � 9.28, p � .01). In both cases, the relationships were smaller when TB or TV was also measured. Although the CIs did not overlap for the relationship between CB and CV, they were over- lapping for the relationship between CB and depression.
Table 4 Moderator Analyses: Analysis of Variance Results for School Grade Level of Sample
Measure N k r� CIr� [95%] Between- group Q
CV TV (all) 161,808 76 0.40 [0.36, 0.43] 6.31�
TV (MS only) 51,636 27 0.37 [0.31, 0.43] TV (MS and HS) 66,649 26 0.46 [0.40, 0.51] TV (HS only) 43,523 23 0.36 [0.30, 0.43]
Note. CV � cyberbullying victimization; TV � traditional bullying victimization; MS � middle school; HS high school; r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity. � p � .05.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
49CYBERBULLYING REVIEW AND META-ANALYSIS
Gender. The final moderator analysis examined whether the proportion of the sample that was female moderated each relation- ship. This analysis was conducted with weighted regression anal- ysis with restricted maximum-likelihood estimation. The percent- age of females was entered as the predictor of each weighted effect size. Sufficient data were available for 14 construct pairs (see Table 9 for variables included in these analyses). Results indicate that the only significant relationship moderated by the proportion of females was the relationship between CV and depression ( � .41, Qmodel � 6.11, p � .05). This indicates that, when a sample contained more females, the relationship between CV and depres- sion tended to be larger.
Meta-Analysis Discussion
We used meta-analysis to examine data from 131 studies on cyberbullying. This meta-analysis is the first of its kind to quan- titatively synthesize the growing body of research on cyberbully- ing, to highlight the magnitude of the relations between predictors and outcomes of CB and CV, and to identify the conditions under which these relationships might differ. The studies included in the meta-analysis represented a wide array of approaches to the study of cyberbullying, both in terms of sample characteristics (e.g., sample size, country of origin, breakdown of gender in each sample) and of measurement features (e.g., reporting time frame,
Table 5 Moderator Analyses: Analysis of Variance Results for Country of Origin
Measure N k r� CIr� [95%] Between-group Q
Cyberbullying victimization (CV) Loneliness (all) 16,653 8 0.24 [0.16, 0.31] 7.50��
Loneliness (North America) 450 3 0.40 [0.26, 0.52] Loneliness (Europe/Australia) 16,203 5 0.17 [0.08, 0.26]
Self-esteem (all) 28,575 20 �0.16 [�0.19, �0.13] 7.29��
Self-esteem (North America) 11,687 14 �0.19 [�0.23, �0.15] Self-esteem (Europe/Australia)
16,888 6 �0.11 [�0.15, �0.06]
Traditional victimization (all) 158,338 77 0.40 [0.37, 0.44] 5.45�
TV (North America) 59,835 34 0.45 [0.40, 0.50] TV (Europe/Australia) 98,503 43 0.37 [0.32, 0.41]
Traditional bullying (all) 123,901 58 0.25 [0.23, 0.27] 13.02���
TB (North America) 33,152 24 0.31 [0.27, 0.34] TB (Europe/Australia) 90,749 34 0.21 [0.18, 0.25]
Cyberbullying perpetration Self-esteem (all) 20,716 14 �0.09 [�0.11, �0.07] 7.13��
Self-esteem (North America) 10,138 9 �0.12 [�0.15, �0.09] Self-esteem (Europe/Australia)
10,578 5 �0.05 [�0.09, �0.02]
Traditional victimization (all) 120,337 57 0.20 [0.18, 0.23] 8.13��
TV (North America) 30,843 23 0.25 [0.21, 0.29] TV (Europe/Australia) 89,494 34 0.17 [0.14, 0.21]
Note. TV � traditional bullying victimization; TB � traditional bullying perpetration; r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity. � p � .05. �� p � .01. ��� p � .001.
Table 6 Moderator Analyses: Analysis of Variance Results for Single vs. Multiple Item Measures of CV/CB
Measure N k r� CIr� [95%] Between- group Q
Cyberbullying victimization (CV) Social anxiety (all) 13,408 9 0.15 [0.11, 0.18] 4.52�
Social anxiety (single item) 2,837 3 0.08 [0.02, 0.15] Social anxiety (multiple items) 10,571 6 0.17 [0.13, 0.22]
Cyberbullying perpetration (CB) CV (all) 147,434 91 0.51 [0.47, 0.55] 11.64���
CV (single item) 53,478 25 0.40 [0.31, 0.48] CV (multiple items) 93,956 66 0.55 [0.51, 0.60]
Note. r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity. �p � .05. ��� p � .001.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
50 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
number of items in the measure, inclusion of a bullying definition, whether traditional bullying was also measured).
Our results highlight the risk factors (e.g., traditional bullying or victimization, anger, moral disengagement, risky online behavior, and the frequency of Internet use) that may predispose one to become involved with CB or CV and the protective factors (e.g., school safety, school climate, perceived support, and parental monitoring) that might limit one’s involvement as a bully or victim. Additionally, the results of the meta-analysis highlight a number of variables that are associated with increased reporting of CB and CV, including psychological variables such as increased depression and decreased life satisfaction and behavioral variables like increased drug and alcohol use. There was also a negative relationship between cyberbullying perpetration and academic achievement. Beyond providing a broad picture of the pattern of relationships between CB/CV and meaningful behavioral and psy- chological variables, the current meta-analysis identified a number of significant between-study moderators, including sample origin, number of items in CB/CV measurement, inclusion of a bullying
definition, co-measurement of traditional bullying, and gender. No significant moderating role was identified for publication status or reporting time frame of measurement. In the discussion below, we (a) review the weighted mean effect size findings for the relation- ships with CB/CV; (b) discuss moderation of these findings by origin of sample, grade level of sample, and measurement charac- teristics; (c) identify limitations of this review; and (d) highlight implications of this research. Avenues for future research stem- ming from this meta-analysis will be provided within the Future Research section.
Relationships With Cyberbullying Perpetration
The results indicate that CB is highly related to both TB and CV, indicating that individuals who cyberbully tend to bully others in face-to-face settings and to be victims of cyberbullying as well. These results support the claims made by many researchers that cyberbullying may be an extension of traditional bullying (Olweus, 2013; P. K. Smith et al., 2008) and that experiencing CV may
Table 7 Moderator Analyses: Analysis of Variance Results for CB Definition or “Bully” Mentioned vs. Not Mentioned Prior to CV/CB Measurement
Measure N k r� CIr� [95%] Between- group Q
Cyberbullying victimization (CV) Age (all) 52,782 32 0.01 [�0.01, 0.04] 4.07�
Age (no definition) 11,515 14 0.04 [0.01, 0.08] Age (definition provided) 41,267 18 �0.01 [�0.03, 0.02]
Cyberbullying perpetration (CB) Age (all) 52,105 31 0.05 [0.03, 0.08] 3.99�
Age (no definition) 14,959 16 0.08 [0.04, 0.12] Age (definition provided) 37,146 15 0.03 [�0.01, 0.07]
Traditional victimization (all) 126,264 61 0.21 [0.18, 0.23] 5.34�
TV (no definition) 27,779 21 0.25 [0.21, 0.29] TV (definition provided) 98,485 40 0.19 [0.15, 0.22]
CV (all) 147,434 91 0.51 [0.47, 0.55] 7.92��
CV (no definition) 41,156 42 0.57 [0.52, 0.62] CV (definition provided) 106,278 49 0.46 [0.40, 0.52]
Note. r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity; TV � traditional bullying victimization. � p � .05. �� p � .01.
Table 8 Moderator Analyses: Analysis of Variance Results for Traditional Bullying Measured or Not Measured
Measure N k r� CIr� [95%] Between- group Q
Cyberbullying perpetration (CB) Depression (all) 19,820 16 0.15 [0.11, 0.19] 6.75��
Depression (TB not measured) 2,221 4 0.25 [0.16, 0.33] Depression (TB also measured) 17,599 12 0.12 [0.08, 0.17]
CV (all) 147,434 91 0.51 [0.47, 0.55] 9.28��
CV (TB not measured) 17,666 27 0.60 [0.54, 0.66] CV (TB also measured) 129,768 64 0.47 [0.42, 0.52]
Note. r� � observed correlation corrected for sampling error; k � number of independent associations; CI � confidence interval; Q � Cochran’s (1954) measure of homogeneity; TB � traditional bullying perpetration; CV � cyberbullying victimization. �� p � .01.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
51CYBERBULLYING REVIEW AND META-ANALYSIS
provoke one to engage in CB, or vice versa (Kowalski, Limber, & Agatston, 2012), perhaps triggering a chain of back-and-forth CB/CV episodes. However, it is important to note that TB ex- plained only 20% of the variance in reports of CB (i.e., r � .452 � .20), suggesting that not all individuals who report being bullied in traditional ways also report being cyberbullied. Indeed, previous research suggests that approximately 10% of those individuals who perpetrate CB do not also perpetrate TB (see, e.g., Raskauskas & Stoltz, 2007).
Other variables that exhibited a significant relationship with CB include believing that CB is an acceptable way to behave and having high levels of moral disengagement, supporting previous theoretical work on social-cognitive theory of moral thought and behavior (Bandura, 1999), and extending previous research linking moral disengagement with TB (Menesini et al., 2003). Addition- ally, it appears that being online more often is associated with greater CB, and engaging in risky online behavior is also linked with increased risk for CB. These behaviors may play a role in making an individual more susceptible to CB or CV.
A number of protective factors were identified in the current meta-analysis, including personal characteristics, parental involve- ment, and school characteristics. One personal characteristic that appeared to offer an individual protection from engaging in CB was empathy. Individuals who reported higher levels of cognitive and affective empathy (or an ability to share the emotions of other people) tended to engage in CB less frequently. Additionally, parental monitoring was negatively related to CB. Finally, school variables that were inversely linked to engagement in CB included school climate (e.g., respect, fairness, and kindness of staff) and school safety. These results provide support for the role of personal (i.e., empathy) and situational factors (i.e., school climate and safety) in the episodic processes of the GAM model.
In terms of behavioral variables, individuals who engage in high levels of CB also reported using higher amounts of drugs and alcohol and obtaining lower levels of academic achievement. These findings highlight the cascade of problem behaviors en- gaged in by individuals who cyberbully. Additionally, results also linked engagement in CB with a number of negative psychological variables, including higher levels of anxiety, loneliness, and de- pression and lower levels of self-esteem and life-satisfaction. Many of these associations were identified with victims of cyber- bullying, and, thus, their linkage with CB may be a reflection of
the fact that many individuals who cyberbully also tend to be cybervictims. Again, the absence of longitudinal associations in this regard precludes causal statements regarding directionality of effects.
Relationships With Cyberbullying Victimization
Experiencing CV was highly related to victimization in tradi- tional ways as well. That is, individuals who reported high levels of CV also tended to report high levels of TV, indicating that many individuals may be targets of bullying behavior in both face-to- face and online contexts, providing further support for the idea that cyberbullying can be considered an extension of traditional bully- ing (P. K. Smith et al., 2008). Additionally, a number of risk factors were positively related to victimization online, including social anxiety, frequency of Internet use, and risky online behav- ior. Several preventive factors also emerged as potential protective factors in the experience of victimization online, including school safety, school climate, and perceived support. These results indi- cate that individuals who report higher levels of CV also report lower levels of school safety, climate, and support from others.
Finally, a number of positive relationships were found between CV and psychosocial and behavioral variables, including stress, anxiety, depression, loneliness, conduct problems, emotional prob- lems, somatic symptoms, and drug and alcohol use. Most concern- ing, a moderately positive relationship was found between CV and suicidal ideation, indicating that individuals reporting higher levels of CV also reported having thought about committing suicide more often. These findings highlight the well-documented impact that cyberbullying victimization has on an individual’s psychological and physical health and the need for interventions targeted at reducing the incidence of both TV and CV and providing support for victims.
Moderators of the CB/CV Relations
Grade level. Our goal in examining this moderator variable was to determine whether the pattern of relationships between CB/CV and behavioral and psychological variables would be stronger or weaker as individuals progressed through school. Given that cyberbullying is thought to peak in late middle school (Hinduja & Patchin, 2008; Williams & Guerra, 2007), we might
Table 9 Moderator Analyses: Modified Weighted Regression Analyses With Percent of Sample That Was Female as Moderator
Measure
Cyberbullying perpetration Cyberbullying victimization
N k R2 Q (model) N k R2 Q (model)
CV 147,434 91 �0.01 0 0 TV 126,264 58 0.17 0.03 1.66 164,280 77 0.18 0.03 2.48 TB 136,105 67 0.10 0.01 0.63 128,642 57 0.01 0 0 Age 52,105 31 0.01 0 0 52,782 32 �0.05 0 0.08 Frequency of Internet use 6,764 12 �0.20 0.04 0.43 5,427 12 �0.34 0.12 1.43 Depression 19,820 16 �0.16 0.03 0.40 55,929 30 0.41 0.17 6.11�
Self-esteem 21,342 14 0.26 0.07 0.83 29,201 21 �0.20 0.04 0.91 Anxiety 7,450 14 0.18 0.03 0.34
Note. CV � cyberbullying victimization; TV � traditional bullying victimization; TB � traditional bullying perpetration; k � number of independent associations; � standardized regression coefficient; Q (model) � regression model sum of squares, distributed as a chi-square with 1 degree of freedom. � p � .05.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
52 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
predict that relationships between CB/CV and other variables would be strongest among middle school samples. However, we found that samples containing both middle school and high school students had larger relations between CV and TV compared to samples containing only middle school students or only high school students. One possible reason for this could be that there might be larger variance in the cybervictimization variable among the combined middle school and high school samples, which could have inflated the size of the correlation between these variables. Another possible reason could be that there is an increased prev- alence of cybervictimization around the time that students are leaving middle school and entering high school.
A majority of the samples that contained middle school and high school samples contained students from late middle school (sev- enth and eighth grade) and students from early high school (ninth and 10th grade), rather than the full range of grades that might be in either school. The middle school only samples were, in fact, significantly younger in terms of average age (Mage � 12.16) than this combined group, Mage � 14.02; t(80) � 7.92, p � .001, and the high school only samples were significantly older (Mage � 15.10) than this combined group, t(78) � 4.46, p � .001. There- fore, these results seem to support the idea that outcomes might be worst among students in seventh through 10th grade. As students reach the peak bullying age, the results indicate that youth tend to experience both CV and TV. Because we know that experiencing CV is linked with anxiety, depression, and suicidal ideation, know- ing which age group to target for intervention efforts might help schools and communities better deal with these issues.
Country of origin. Although the current meta-analysis ini- tially sought to make comparisons among different continents in which research on CB had been conducted (i.e., Australia, Asia, Europe, North America), there were insufficient studies to allow for moderator analyses in each of these categories. Nonetheless, comparisons were possible between North America and Europe/ Australia, and results indicated that relationships between CV and loneliness, self-esteem, TV, and TB, as well as between CB and self-esteem and TV were all stronger in North American samples than in European/Australian samples. There are a number of pos- sibilities for why these differences exist. One possibility is that a larger number of nationwide interventions have been conducted in European countries than in North America (e.g., Genta, Brighi, & Guarini, 2009; Livingstone & Haddon, 2009; Paul, Smith, & Blumberg, 2010), and, thus, the overall prevalence in these coun- tries might be lower than in North America. Indeed, we tested this possibility with available data from Table 1, and the difference in average CV prevalence rates between European/Australian sam- ples (M � 16.34) and North American samples (M � 21.6) is marginally significant, t(54) � 1.56, p � .06 (one-tailed). No differences were found in average cyberbullying perpetration rates between European/Australian samples (M � 14.52) and North American samples, M � 14.85; t(49) � 0.09, p � .46.
Another possibility could be due to differences in culture be- tween North America and other parts of the world. For example, differences in power distance and individualism/collectivism have been demonstrated between North America and elsewhere, and these differences may manifest in bullying behaviors. In collectiv- istic cultures, the number of perpetrators typically exceeds the number of targets, as perpetrators often act in groups. In more individualistic cultures, the number of targets most often exceeds
the number of perpetrators (Koo, Kwak, & Smith, 2008; see also Berger, 2007; Li, 2007b, 2008). Cross et al. (2012) suggest that, when making cross-cultural comparisons of prevalence rates of cyberbullying, it is important to keep in mind that (a) bullying and cyberbullying may not demonstrate definitional consistency across different cultures and (b) varying prevalence rates may reflect cultural differences in policy rather than the nature of the behavior itself. In addition, as methodological and conceptual issues may also differ across cultures, additional research is needed on this topic (Walrave & Heirman, 2011).
Single-item vs. multiple-item measures. A wide array of measurement tools exist for measuring cyberbullying. Some of them utilize a single item for indexing the frequency of CB/CV, whereas others contain several items. Results of moderator anal- yses revealed that effect sizes tended to be larger for the relation- ships between CV and social anxiety and CV and CB when multiple items were used to measure CB/CV. One possible reason for this is that using multiple items tends to result in higher reliability of measurement, and such increased reliability may increase the size of correlation coefficients (Murphy & David- shofer, 2005).
Provision of a bullying definition or the word “bully.” As several authors have speculated (e.g., Menesini & Nocentini, 2009) and recent research by Ybarra et al. (2012) has shown, labeling behaviors as bullying resulted in lower prevalence rates than providing neither a definition nor the word “bully” and using a behavioral checklist. In the current meta-analysis, we examined whether provision of a definition or inclusion of the word “bully” might be related to effect sizes across studies. Results of moderator analyses revealed that providing a definition or mentioning the word “bully” in the measure of CB/CV resulted in smaller rela- tionships of CV with age and CB with age, TV, and CV than if a definition or the word “bully” was not included.
One possible reason for these smaller relationships could be that having a definition affects socially desirable responding (Menesini & Nocentini, 2009). The word “bully” carries a negative conno- tation, and individuals may be less willing to report that they bullied someone else or were the victim of bullying. Thus, when this word is included in measures, overall mean scores are likely to be lower. Another possibility is that provision of a definition of bullying makes participants more aware of the bullying phenom- enon, thus affecting their response processes. Participants might be more likely to carefully reflect on whether they actually experi- enced/participated in cyberbullying once they have a clearer un- derstanding of what such behavior entails. This may result in less variability in the measure of CB/CV because participants know what is being measured more clearly and are less likely to mis- classify themselves as either a perpetrator or a victim of cyberbul- lying. This reduced variability in the CB/CV measure could, therefore, restrict the size of the correlation coefficient (Murphy & Davidshofer, 2005).
Measurement of traditional bullying. Many studies exam- ining cyberbullying had the goal of determining how the frequency of CB/CV compared to the frequency of TB/TV. Results of this moderator analysis revealed that when TB or TV had also been measured, there were smaller relationships between CB and de- pression and CB and CV. One possible reason for the differences in effect sizes could be that, when individuals respond to measures of CB/CV in the absence of other measures of bullying, they may
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
53CYBERBULLYING REVIEW AND META-ANALYSIS
be including other types of bullying experiences in their responses. When other measures of bullying are included in the study, some of these responses then get (properly) classified as traditional bullying.
Gender. Mixed results have been reported in previous re- search on the role that gender plays in predicting either cyberbul- lying or cybervictimization. Some researchers have found no link between the two variables (e.g., Williams & Guerra, 2007). Other studies have found that males are more likely to perpetrate, whereas females are more likely to be victims of cyberbullying (Sourander et al., 2010). Results of moderator analyses revealed that gender significantly moderated the cybervictimization– depression relationship, indicating that, as the percentage of the sample that was female increases, the relationship between cyber- victimization and depression increases. These results might indi- cate that females are more susceptible than males to the damaging consequences of cybervictimization, but further research is needed in this area to understand the role that gender plays.
Limitations
One common concern when conducting a meta-analysis is pub- lication bias. That is, studies that contain statistically significant findings are more likely to be published than findings that are not statistically significant (Hedges & Vevea, 1996). This bias can be problematic, because it may lead to meta-analytic findings that are overly high because large significant effects represent a greater proportion of the meta-analytic database. However, as noted in the results section, the current meta-analysis was able to deal with this limitation, as 16.8% of the effect sizes reported were based on unpublished work and no differences in effect size were found between published and unpublished studies.
A second limitation of this research is that we cannot make causal statements about the relations between CB/CV and the behavioral and psychological variables because all of the studies included in the meta-analysis used designs that were correlational in nature. Thus, we cannot guarantee temporal precedence nor rule out possible third variable confounds. For example, is it the case that an individual has low self-esteem and decides to perpetrate cyberbullying as a result? Or is it that he or she perpetrates cyberbullying and, as a result, feels less positively about him- or herself? As another example, we found that depression was related to both CB and CV, but it might be acting as a third variable influencing both constructs. Future research should examine CB/CV within an experimental setting to help establish temporal precedence and attempt to control for such third variables when designing such studies. In many cases, experimental manipulation may not be feasible, and so the best recommendation is to conduct longitudinal studies to better address questions of temporal prece- dence.
Another limitation deals with generalizability. Our goal in this meta-analysis was to be comprehensive and include as many predictors and outcomes in the analysis as possible. A number of meta-analytic results included in the current article were based on five or fewer samples (k � 5). As such, the weighted mean effect sizes from these meta-analyses may be less reliable, and thus should be interpreted with caution. However, their inclusion in the meta-analysis provides us with a preliminary picture of their
relationship with CB/CV and highlights the need to study these variables further in future research.
Additionally, because there is some overlap in involvement with cyberbullying and traditional bullying, it is difficult to tease apart the adverse effects following from cyberbullying alone compared to exposure to both cyberbullying and traditional bullying (Kowal- ski & Limber, 2013). Olweus (2013) summed it up well when he stated “to find out about the possible negative effects of cyber- victimization is a complex and challenging research task.” Addi- tional research examining the unique and joint contributions of involvement in cyberbullying and traditional bullying to negative physical and psychological outcomes is needed.
Another limitation deals with the possibility of an inflated Type I error rate. Given that the current study involved conducting moderator analyses for a large number of behavioral and psycho- logical correlates of cyberbullying and cybervictimization, there is an increased chance that a significant between-group Q might be found in the moderator analyses (Cafri, Kromrey, & Brannick, 2010). Additionally, many of the significant moderated relation- ships had confidence intervals that overlapped between categories of the moderator, which suggests that the differences, although statistically significant, were relatively small. Therefore, for those moderator analyses that revealed a small, but significant between- group Q and overlapping confidence intervals, caution is advised in interpreting these results.
Finally, a number of different theoretical models have been applied to traditional bullying behavior in the literature. Among the theories that we could have selected for conceptually under- standing cyberbullying behavior is Bronfenbrenner’s (1979) eco- logical systems theory, which situates individual behavior within five environmental systems (i.e., microsystem, mesosystem, exo- system, macrosystem, and chronosystem). Whereas this would be a useful means of discussing cyberbullying, we selected the GAM because (a) we believe that it better allows researchers to formulate testable hypotheses to advance research in the cyberbullying arena, and (b) elements of the GAM incorporate the larger situational elements (e.g., school) advocated by other theoretical models, such as ecological systems theory. We are not claiming, however, that the GAM is the only useful theoretical model for examining cyberbullying behavior. Indeed, for particular features of cyber- bullying, an alternative theoretical model might be preferred. In particular, a systemic-ecological model, such as that discussed by Mishna (2003), might be better suited than the GAM when de- signing, implementing, and testing bullying prevention and inter- vention programs.
Implications
This meta-analysis reports relationships of predictors and out- comes with CB and CV. However, moderator analyses reveal that certain relationships with CB/CV are not global. Instead, relation- ships with CB/CV depend on several factors that should be taken into consideration when evaluating research in this area. Relation- ships with CB/CV tend to be largest when studies are completed in North America, measured with multiple items, included a defini- tion or the word “bully” with CB/CV measurement, and traditional bullying was not also measured. These findings have several implications. First, studies examining the relationships between CV and social anxiety as well as between CV and CB might be
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
54 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
more likely to report larger relationships when CB/CV is measured with multiple items. Secondly, the relationships of CB with CV, age, and TV as well as between CV and age may potentially be inflated when neither a definition of bullying nor the word “bully” is provided along with the measure. Olweus (2013) addressed this measurement issue, calling, as we do, for additional empirical research attention devoted to addressing both conceptual and methodological issues attached to assessments of bullying, cyber- bullying, and overall aggression. Finally, the relationships of CB with depression and CV are likely to be higher when studies do not also measure traditional bullying. Taken together, these findings suggest that researchers should include a definition of bullying or the word “bully” and also measure traditional bullying in their studies if they want to get the most accurate picture of relation- ships with CB/CV. Although it would also seem that a recommen- dation might be made to measure CB/CV with multiple–item measures, such a recommendation might be premature, as the picture is not quite clear on the impact of this practice.
Future Research
Throughout this article, we have made numerous references to areas of research that are in need of additional investigation. The list is long, but this is not surprising, given the relatively recent emergence of the phenomenon under investigation. Below we propose additional directions for future research, beyond those directions already mentioned, and organize them within the con- text of the GAM as dealing with either person factors or situation factors to help broaden the application of the GAM to the cyber- bullying research domain. We also provide future research direc- tions dealing with study design features.
Person Factors
Existing research has shed light on several personality factors that are associated with involvement in CB/CV, including empa- thy, narcissism, social intelligence, and hyperactivity. However, many other personality traits may also be linked with involvement in CB/CV, including core self-evaluations, competitiveness, curi- osity, dominance and warmth, emotional stability (and other traits of the Big 5 or 16 Personality Factor models), jealousy, locus of control, sensation seeking, and optimism/pessimism (e.g., An- dreou, 2000; Kashdan et al., 2013; Parker, Low, Walker, & Gamm, 2005; Sijtsema, Veenstra, Lindenberg, & Salmivalli, 2009). Recent work has demonstrated that individuals who are high in sensation seeking and relatively low in emotional stability are more likely to be aggressive (Caprara et al., 2013; Dvorak, Pearson, & Kuvaas, 2013), but less is known about how these traits may predispose someone to engaging in cyberbullying perpetration. We would predict, based on the GAM, that these person factors would impact the thoughts, feelings, and arousal of individuals and make them more likely to engage in cyberbullying behavior. Obtaining a better understanding of the role of personality in predicting in- volvement in cyberbullying perpetration or victimization may help us to better design prevention/intervention efforts aimed at treating the individual in the situation (Mason, 2008).
To date, most of the research on cyberbullying has focused on neurotypical children, with little attention given to experiences
with cyberbullying among children with any of a number of disabilities. Because children with particular disabilities, such as autism spectrum disorders, have been shown to have much higher prevalence rates of traditional bullying victimization and perpetra- tion than do neurotypical youth (e.g., Kowalski & Fedina, 2011), it is important to include all youth at all levels of functioning in studies of cyberbullying. Doing this will help inform prevention and intervention efforts.
As the world becomes more technologically advanced, the age of access to technology is decreasing (Lester, Cross, & Shaw, 2012). Much of the existing research on cyberbullying has exam- ined children in middle school or later grades, but less is known about the prevalence of cyberbullying and associated behaviors among younger children. Additionally, the age focus can be ex- panded in the other direction as well to examine cyberbullying among adults in the workplace. In the workplace, the Internet is seen as the primary communication medium among workers in many parts of the world (Lim & Teo, 2009). Namely, among employed adults, approximately 62% use the Internet at work, and among these “wired workers,” more than half report doing at least some work from home through technology (Madden & Jones, 2008). Most workers agree that the Internet has improved their ability to do their job and share ideas with coworkers and has added flexibility to their work schedules and locations (Madden & Jones, 2008). Preliminary work suggests that workplace cyberbul- lying is associated with negative work outcomes, such as reduced job satisfaction, increased absenteeism, and higher turnover inten- tions (Giumetti, McKibben, Hatfield, Schroeder, & Kowalski, 2012). Indeed, it will be important to determine whether children/ adolescents who engage in cyberbullying perpetration or are vic- tims of cyberbullying also experience these behaviors when they enter the workforce. Further investigation of this phenomenon in this setting is warranted.
As discussed previously, there is considerable variability in the literature regarding the influence of individual variables, such as gender and age, on cyberbullying prevalence rates. Although ad- ditional research is certainly needed to further investigate these variables, this variability should also be viewed through the lens of prevention and intervention efforts, rather than as an end in itself. These variations suggest that there will not likely be a one-size- fits-all model of prevention and intervention when it comes to bullying, whether traditional or virtual. Thus, parents, educators, and community members need to be flexible in designing their programs so these can be tailored to the needs of particular populations.
Situational Factors
Possible situational factors to examine include exposure to media violence (e.g., violent video games or television), behav- ioral modeling of siblings, peers, or adults who either engage in or are victims of interpersonal aggression (including CB/CV), paren- tal discipline practices (Kokkinos & Panayiotou, 2007), community-level variables (e.g., crime rates and population den- sity), and society-level variables (e.g., cultural values and political and economic stability).
Preliminary evidence from a nationally representative Canadian sample suggests that children who perpetrate bullying and cyber-
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
55CYBERBULLYING REVIEW AND META-ANALYSIS
bullying also tend to prefer mature and violent video games (Dittrick, Beran, Mishna, Hetherington, & Shariff, 2013). Addi- tionally, recent research in China and Australia indicates that children exposed to violent video games were more likely to be perpetrators of cyberbullying as well as cyberbully victims (Lam, Cheng, & Liu, 2013). Given the cross-sectional nature of this research, it is unclear whether media violence is the causal factor leading to bullying and cyberbullying or vice versa. Additional research is needed to determine whether long-term exposure to media violence leads to increased levels of bullying and cyberbul- lying. Experimental studies examining these variables would also be informative and help us to better understand causal direction. For example, do individuals who are exposed to a cyberbullying encounter prefer to play violent video games over nonviolent video games? Or, might individuals who have just played a violent video game be more likely to engage in cyberbullying perpetration in a subsequent social interaction?
At the community level, it will be important to understand issues like crime rate, population density, and school policies and their relationship with cyberbullying (Hatzenbuehler & Keyes, 2013; P. K. Smith, Kupferberg, et al., 2012). Although there is recent research that suggests that the population density of a community may be related to the likelihood of traditional bullying victimiza- tion (Goldweber, Waasdorp, & Bradshaw, 2013), it appears that no research has examined population density or urbanicity and its relationship with cyberbullying. Another important community- level variable to examine is school policy related to cyberbullying. A recent study by P. K. Smith, Kupferberg, et al. (2012) found that, although many schools do have policies dealing with face- to-face bullying, very few mention cyberbullying or ways to deal with cyberbullying issues at school. Similar findings have been noted in Canada (see, e.g., Cassidy, Brown, & Jackson, 2012) and the United States (see, e.g., Orobko, 2010). Although it is clear that many schools are creating and adopting policies aimed at cyber- bullying (see, e.g., Hunley-Jenkins, 2013), little research has ex- amined the effectiveness of these policies at reducing rates of cyberbullying.
At the national level, additional cross-cultural research is needed in order to better understand national-level differences in preva- lence and associated outcomes from bullying and cyberbullying behaviors. Cultures with low power distance (i.e., members of the culture operate on a more equal playing field relative to one another) might be expected to have less cyberbullying than those with high power distance, or at least cyberbullying motivated by a desire to establish one’s place in the social hierarchy (Power et al., 2013). Additionally, differences in the prevalence of cyberbullying might be expected in individualistic and collectivistic cultures. Shapka and Law (2013), for example, found higher rates of cy- berbullying among East Asian adolescents than those of European descent. In addition to examining these and other cultural dimen- sions from Hofstede (2001), studies should examine the differ- ences in practices, policies, and behaviors typical of a society as identified in the GLOBE research program (House, Hanges, Javi- dan, Dorfman, & Gupta, 2004). For example, might countries with a high humane orientation, whereby individuals are encouraged to be fair and caring to others, be less accepting of bullying and cyberbullying among youth (Power et al., 2013)?
Study Design Features
Methodologically, greater consensus is needed regarding how to conceptualize and measure cyberbullying. One item that research- ers have debated in the CB literature is the necessity of CB measures including all three components of the definition of tra- ditional bullying: (a) intentional act of aggression that (b) is repetitive and (c) occurs among individuals who differ in terms of power (Ybarra et al., 2012). Several researchers have questioned in particular whether an individual should be considered a victim of cyberbullying if he or she has experienced an act of cyberbullying only once. The issue here is that, in a cyber-context, a message has relative permanence, and so an act may become repetitive if it is viewed multiple times. Additionally, the role of power differences among perpetrators and victims has also been questioned in a cyberbullying context, because individuals with different levels of technical skill may be seen as having different power even though they may be the same in other regards (age, height, popularity, etc.). Future research efforts can help to clarify this picture by creating new measures and examining the extent to which existing measures capture these three components of the definition of cyberbullying.
Additional methodological work is needed to help us determine the factor structure of cyberbullying. Preliminary work has helped to establish that it may not be best represented by a single item tapping a single factor but rather by multiple items corresponding with two or more latent factors. Additionally, work by Dempsey et al. (2009) indicated that cybervictimization is a construct distinct from other forms of traditional bullying victimization (i.e., overt and relational) via factor analysis. To further understand the di- mensional structure of cyberbullying, additional work is needed using structural equation modeling. In addition, studies should be designed to examine the nested nature of the cyberbullying phe- nomenon using hierarchical linear modeling, because cyberbully- ing is nested within a myriad of other groups (e.g., schools, communities, states, countries).
The majority of existing research has utilized self-report mea- sures from the perspective of the first person (e.g., the bully or the victim). However, future research that gathers reports of CB from sources other than the self (such as from parents, friends, and teachers) is needed to examine the extent to which there is over- or underreporting of victimization (Calvete et al., 2010) and to ad- dress the issues of social desirability in responding to measures of CB and CV (Beran, Rinaldi, Bickham, & Rich, 2012).
To date, most of the research across cultures has used nonex- perimental methodology (e.g., surveys, interviews, or observa- tions). Although this has provided useful information, more studies manipulating cyberbullying as part of an experimental design (e.g., a study in which participants are instructed to perpetrate cyberbul- lying or an experiment in which participants experience varying degrees of cyberbullying victimization) are needed to determine the impact for victims and perpetrators on specific outcomes among youth or working adults. This will allow for conclusions regarding causal direction (e.g., is cyberbullying the cause of the distal outcomes discussed here; e.g., behavioral problems) and help to rule out possible third variables (such as also experiencing face-to-face bullying) that may explain the outcomes of experi- encing cyberbullying.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
56 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
Another important area in which additional research is needed is closer examinations of the overlap between traditional bullying and cyberbullying (Beckman, Hagquist, & Hellström, 2012; Lester et al., 2012). More research investigating not only the number of people who are involved in both traditional bullying and cyber- bullying but also the unique contributions of involvement in each of these types of bullying to negative mental and physical health outcomes is clearly required. Findings from numerous research studies have already suggested that cyberbullying does indeed contribute unique variance to negative outcomes over and above traditional bullying (e.g., Dempsey et al., 2009; Fredstrom, Adams, & Gilman, 2011; Machmutow, Perren, Sticca, & Alsaker, 2012; Menesini, Calussi, & Nocentini, 2012; Perren et al., 2010; Perren & Gutzwiller-Helfenfinger, 2012; Sakellariou, Carroll, & Houghton, 2012), but additional research is needed in this area. Additionally, more research should track individuals over time to see if traditional bullying at an early age is linked with cyberbul- lying at a later age (or vice versa; Yang et al., 2013). Most of the existing longitudinal research is limited to two measurement oc- casions (for an exception, see Rivers & Noret, 2010). Studies with three or more measurement occasions will allow for examination of the possible reciprocal relationships that may exist between traditional bullying and cyberbullying as well as between victim- ization and bullying. This research will then inform prevention/ intervention efforts. Although we advocate comprehensive bully- ing prevention programs, understanding the relative contributions of traditional bullying and cyberbullying to physical and mental health will be useful in informing these comprehensive bullying prevention programs.
References
References marked with an asterisk indicate studies included in the meta-analysis.
Aftab, P. (2011). Cyberbullying/stalking and harassment. Retrieved from http://www.wiredsafety.net
Agatston, P. W., Kowalski, R. M., & Limber, S. P. (2007). Students’ perspectives on cyberbullying. Journal of Adolescent Health, 41(6, Suppl.), pp. S59–S60. doi:10.1016/j.jadohealth.2007.09.003
�Akbulut, Y., & Eristi, B. (2011). Cyberbullying and victimization among Turkish university students. Australasian Journal of Educational Tech- nology, 27, 1155–1170.
Allen, K. P. (2012). Off the radar and ubiquitous: Text messaging and its relationship to “drama” and cyberbullying in an affluent, academically rigorous U.S. high school. Journal of Youth Studies, 15, 99–117. doi: 10.1080/13676261.2011.630994
�Almeida, A., Correia, I., Marinho, S., & Garcia, D. (2012). Virtual but not less real: A study of cyberbullying and its relations to moral disengage- ment and empathy. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbul- lying in the global playground: Research from international perspec- tives (pp. 223–244). Malden, MA: Blackwell.
Anderson, C. A., & Bushman, B. J. (2002). Human aggression. Annual Review of Psychology, 53, 27–51. doi:10.1146/annurev.psych.53 .100901.135231
Andreou, E. (2000). Bully/victim problems and their association with psychological constructs in 8- to 12-year-old Greek schoolchildren. Aggressive Behavior, 26, 49 –56. doi:10.1002/(SICI)1098- 2337(2000)26:1�49::AID-AB4�3.0.CO;2-M
�Ang, R. P., & Goh, D. H. (2010). Cyberbullying among adolescents: The role of affective and cognitive empathy, and gender. Child Psychiatry
and Human Development, 41, 387–397. doi:10.1007/s10578-010- 0176-3
�Ang, R. P., Tan, K., & Mansor, T. A. (2011). Normative beliefs about aggression as a mediator of narcissistic exploitativeness and cyberbul- lying. Journal of Interpersonal Violence, 26, 2619–2634. doi:10.1177/ 0886260510388286
�Aoyama, I. (2011). Cyberbullying: What are the psychological profiles of bullies, victims, and bully-victims? (Doctoral dissertation). Available from Dissertation Abstracts International.
�Aoyama, I., Barnard-Brak, L., & Talbert, T. (2011). Cyberbullying among high school students: Cluster analysis, sex and age differences and the level of parental monitoring. International Journal of Cyber Behavior, Psychology and Learning, 1, 25–35. doi:10.4018/ijcbpl.2011010103
�Aoyama, I., Saxon, T. F., & Fearon, D. D. (2011). Internalizing problems among cyberbullying victims and moderator effects of friendship qual- ity. Multicultural Education & Technology Journal, 5, 92–105. doi: 10.1108/17504971111142637
�Aoyama, I., Utsumi, S., & Hasegawa, M. (2012). Cyberbullying in Japan: Cases, government reports, adolescent relational aggression, and paren- tal monitoring roles. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyber- bullying in the global playground: Research from international perspec- tives (pp. 183–201). Malden, MA: Blackwell.
Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., & Memmedov, C. (2008). Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11, 253–261. doi:10.1089/ cpb.2007.0016
Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice-Hall.
Bandura, A. (1999). Moral disengagement in the perpetration of inhuman- ities. Personality and Social Psychology Review, 3, 193–209. doi: 10.1207/s15327957pspr0303_3
Bandura, A., Barbaranelli, C., Caprara, G., & Pastorelli, C. (1996). Mech- anisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71, 364–374. doi:10.1037/0022- 3514.71.2.364
�Barlett, C. P., & Gentile, D. A. (2012). Attacking others online: The formation of cyberbullying in late adolescence. Psychology of Popular Media Culture, 1, 123–135. doi:10.1037/a0028113
�Bauman, S. (2010). Cyberbullying in a rural intermediate school: An exploratory study. Journal of Early Adolescence, 30, 803–833. doi: 10.1177/0272431609350927
�Bauman, S., & Pero, H. (2011). Bullying and cyberbullying among deaf students and their hearing peers: An exploratory study. Journal of Deaf Studies and Deaf Education, 16, 236–253. doi:10.1093/deafed/enq043
Beckman, L., Hagquist, C., & Hellström, L. (2012). Does the association with psychosomatic health problems differ between cyberbullying and traditional bullying? Emotional and Behavioural Difficulties, 17, 421– 434. doi:10.1080/13632752.2012.704228
Bennett, D. C., Guran, E. L., Ramos, M. C., & Margolin, G. (2011). College students’ electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors. Violence and Victims, 26, 410–429. doi:10.1891/0886-6708.26.4.410
Beran, T., & Li, Q. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32, 265– 277. doi:10.2190/8YQM-B04H-PG4D-BLLH
�Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1, 15–33.
�Beran, T. N., Rinaldi, C., Bickham, D. S., & Rich, M. (2012). Evidence for the need to support adolescents dealing with harassment and cyber- harassment: Prevalence, progression, and impact. School Psychology International, 33, 562–576. doi:10.1177/0143034312446976
�Berarducci, L. R. (2009). Traditional bullying victimization and new cyberbullying behaviors (Master’s thesis). Available from Dissertation Abstracts International.
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
57CYBERBULLYING REVIEW AND META-ANALYSIS
Berger, K. S. (2007). Update on bullying at school: Science forgotten? Developmental Review, 27, 90–126. doi:10.1016/j.dr.2006.08.002
Bergeron, N., & Schneider, B. H. (2005). Examining cross-national dif- ferences in peer-related aggression: A quantitative synthesis. Aggressive Behavior, 31, 116–137. doi:10.1002/ab.20049
Berson, I. R., Berson, M. J., & Ferron, J. M. (2002). Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Journal of School Violence, 1, 51–71. doi:10.1300/J202v01n02_04
�Blais, J. J. (2009). Chatting, befriending, and bullying: Adolescent Inter- net experiences and associated psychosocial outcomes. Available from Dissertation Abstracts International.
�Bonanno, R. (2007). Bullied to the brink: An investigation of students at risk for depression and suicidal ideation (Doctoral dissertation). Avail- able from Dissertation Abstracts International.
Borenstein, M., Hedges, L. V., Higgins, J. P. T., & Rothstein, H. R. (2009). Introduction to meta-analysis. Hoboken, NJ: Wiley.
�Bossler, A. M., & Holt, T. J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 227– 236. doi:10.1016/j.jcrimjus.2010.03.001
Brighi, A., Guarini, A., Melotti, G., Galli, S., & Genta, M. L. (2012). Predictors of victimisation across direct bullying, indirect bullying and cyberbullying. Emotional and Behavioural Difficulties, 17, 375–388. doi:10.1080/13632752.2012.704684
�Brighi, A., Melotti, G., Guarini, A., Genta, M. L., Ortega, R., Mora- Merchen, J., . . . Thompson, F. (2012). Self-esteem and loneliness in relation to cyberbullying in three European countries. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 32–56). Chicester, United King- dom: Wiley-Blackwell.
Bronfenbrenner, U. (1979). The ecology of human development: Experi- ments by nature and design. Cambridge, MA: Harvard University Press.
Cafri, G., Kromrey, J. D., & Brannick, M. T. (2010). A meta-meta- analysis: Empirical review of statistical power, Type I error rates, effect sizes, and model selection of meta-analyses published in psychology. Multivariate Behavioral Research, 45, 239 –270. doi:10.1080/ 00273171003680187
�Calmaestra-Villen, J. (2011). Cyberbullying: Prevalence and character- istics of a new type of indirect bullying. Available from Dissertation Abstracts International.
�Calvete, E., Orue, I., Estévez, A., Villardón, L., & Padilla, P. (2010). Cyberbullying in adolescents: Modalities and aggressors’ profile. Com- puters in Human Behavior, 26, 1128–1135. doi:10.1016/j.chb.2010.03 .017
�Campfield, D. (2009). Cyber bullying and victimization: Psychosocial characteristics of bullies, victims, and bully/victims (Doctoral disserta- tion). Available from Dissertation Abstracts International.
�Cappadocia, M. C. (2009). Cyberbullying and cybervictimization: Prev- alence, stability, risk and protective factors, and psychosocial problems (Master’s thesis). Available from ProQuest Dissertations and Theses.
Caprara, G. V., Alessandri, G., Tisak, M. S., Paciello, M., Caprara, M. G., Gerbino, M., & Fontaine, R. G. (2013). Individual differences in per- sonality conducive to engagement in aggression and violence. European Journal of Personality, 27, 290–303. doi:10.1002/per.1855
Cassidy, W., Brown, K., & Jackson, M. (2012). “Under the radar”: Edu- cators and cyberbullying in schools. School Psychology International, 33, 520–532. doi:10.1177/0143034312445245
Center for the Digital Future at the USC Annenberg School. (2010). The 2010 Digital Future Report. Retrieved from http://www.digitalcenter. org
�Cetin, B., Eroğlu, Y., Peker, A., Akbaba, S., & Pepsoy, S. (2012). The investigation of relationship among relational interdependent self- construal and psychological disharmony in adolescents: An investigation
of structural equation modeling. Educational Sciences: Theory & Prac- tice, 12, 646–653.
�Cetin, B., Peker, A., Eroğlu, Y., & Çitemel, N. (2011). Interpersonal cognitive distortions as a predictor of cyber victimization and bullying: A preliminary report in adolescents. International Online Journal of Educational Sciences, 3, 1064–1080.
�Çetin, B., Yaman, E., & Peker, A. (2011). Cyber victim and bullying scale: A study of validity and reliability. Computers & Education, 57, 2261–2271. doi:10.1016/j.compedu.2011.06.014
�Cheng, Y., Chen, L., Liu, K., & Chen, Y. (2011). Development and psychometric evaluation of the school bullying scales: A Rasch mea- surement approach. Educational and Psychological Measurement, 71, 200–216. doi:10.1177/0013164410387387
�Chin, M. A. (2011). Prevalence, gender differences, and mental health problems associated with traditional and cyberbullying (Master’s the- sis). Retrieved from ProQuest Dissertations and Theses.
Cochran, W. G. (1954). The combination of estimates from different experiments. Biometrics, 10, 101–129. doi:10.2307/3001666
Cohen, J. (1992). A power primer. Psychological Bulletin, 112, 155–159. doi:10.1037/0033-2909.112.1.155
Cox Communications. (2009). Teen online & wireless safety survey: Cy- berbullying, sexting, and parental controls. Retrieved from http://www .cox.com/takecharge/safe_teens_2009/media/2009_teen_survey_ Internet_and_wireless_safety.pdf
Coyne, I., Chesney, T., Logan, B., & Madden, N. (2009). Griefing in a virtual community: An exploratory survey of second life residents. Zeitschrift für Psychologie/Journal of Psychology, 217, 214–221. doi: 10.1027/0044-3409.217.4.214
Crick, N. R., & Dodge, K. A. (1994). A review and reformulation of social information-processing mechanisms in children’s social adjustment. Psychological Bulletin, 115, 74–101. doi:10.1037/0033-2909.115.1.74
Cross, D., Li, Q., Smith, P., & Monks, H. (2012). Understanding and preventing cyberbullying: Where have we been and where should we be going? In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 287– 305). Chichester, United Kingdom: Wiley-Blackwell.
�Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L., & Thomas, L. (2009). Australian Covert Bullying Prevalence Study (ACBPS). Retrieved from www.deewr.gov.au/Schooling/NationalSafe Schools/Pages/research.aspx
D’Antona, R., Kevorkian, M., & Russom, A. (2010). Sexting, texting, cyberbullying and keeping youth safe online. Journal of Social Sciences, 6, 523–528. doi:10.3844/jssp.2010.523.528
David-Ferdon, C., & Hertz, M. F. (2007). Electronic media, violence, and adolescents: An emerging public health problem. Journal of Adolescent Health, 41(6, Suppl.), S1–S5. doi:10.1016/j.jadohealth.2007.08.020
Dehue, F., Bolman, C., & Völlink, T. (2008). Cyberbullying: Youngsters’ experiences and parental perception. CyberPsychology & Behavior, 11, 217–223. doi:10.1089/cpb.2007.0008
�Dehue, F., Bolman, C., Völlink, T., & Pouwelse, M. (2012). Cyberbully- ing and traditional bullying in relation to adolescents’ perception of parenting. Journal of CyberTherapy and Rehabilitation, 5, 25–34.
�Dempsey, A. G., Sulkowski, M. L., Dempsey, J., & Storch, E. A. (2011). Has cyber technology produced a new group of peer aggressors? Cy- berpsychology, Behavior, and Social Networking, 14, 297–302. doi: 10.1089/cyber.2010.0108
�Dempsey, A. G., Sulkowski, M. L., Nichols, R., & Storch, E. A. (2009). Differences between peer victimization in cyber and physical settings and associated psychosocial adjustment in early adolescence. Psychol- ogy in the Schools, 46, 962–972. doi:10.1002/pits.20437
�Didden, R., Scholte, R. H. J., Korzilius, H., de Moor, J. M. H., Vermeulen, A., O’Reilly, M., . . . Lancioni, G. E. (2009). Cyberbullying among students with intellectual and developmental disability in special edu-
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
58 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
cation settings. Developmental Neurorehabilitation, 12, 146–151. doi: 10.1080/17518420902971356
Diener, E. (1980). The psychology of group influence. New York, NY: Erlbaum.
Dilmac, B. (2009). Psychological needs as a predictor of cyber bullying: A preliminary report on college students. Educational Sciences: Theory and Practice, 9, 1307–1325.
Dittrick, C. J., Beran, T. N., Mishna, F., Hetherington, R., & Shariff, S. (2013). Do children who bully their peers also play violent video games? A Canadian national study. Journal of School Violence, 12, 297–318. doi:10.1080/15388220.2013.803244
�Dooley, J. J., Gradinger, P., Strohmeier, D., Cross, D., & Spiel, C. (2010). Cyber-victimisation: The association between help-seeking behaviours and self-reported emotional symptoms in Australia and Austria. Austra- lian Journal of Guidance and Counselling, 20, 194–209. doi:10.1375/ ajgc.20.2.194
Dooley, J. J., Pyżalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. Zeitschrift für Psychologie/Journal of Psychology, 217, 182–188. doi:10.1027/ 0044-3409.217.4.182
�Dooley, J. J., Shaw, T., & Cross, D. (2012). The association between the mental health and behavioural problems of students and their reactions to cyber-victimization. European Journal of Developmental Psychology, 9, 275–289. doi:10.1080/17405629.2011.648425
�Doyle, M. E. (2009). Victims of cyber-bullying: The roles of parent and school connectedness (Doctoral dissertation). Available from ProQuest Dissertations and Theses.
Dvorak, R. D., Pearson, M. R., & Kuvaas, N. J. (2013). The five-factor model of impulsivity-like traits and emotional lability in aggressive behavior. Aggressive Behavior, 39, 222–228. doi:10.1002/ab.21474
�Erdur-Baker, Ö. (2010). Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of Internet-mediated communication tools. New Media & Society, 12, 109–125. doi:10.1177/ 1461444809341260
�Erdur-Baker, Ö., & Kavşut, F. (2007). Cyber bullying: A new face of peer bullying. Eurasian Journal of Educational Research, 27, 31–42.
�Erdur-Baker, O., & Tanrikulu, I. (2010). Psychological consequences of cyber bullying experiences among Turkish secondary school children. Procedia Social and Behavioral Sciences, 2, 2771–2776. doi:10.1016/j .sbspro.2010.03.413
�Erentaitė, R., Bergman, L. R., & Žukauskienė, R. (2012). Cross- contextual stability of bullying victimization: A person-oriented analysis of cyber and traditional bullying experiences among adolescents. Scan- dinavian Journal of Psychology, 53, 181–190. doi:10.1111/j.1467-9450 .2011.00935.x
�Estévez, A., Villardón, L., Calvete, E., Padilla, P., & Orue, I. (2010). Adolescentes víctimas de cyberbullying: Prevalencia y características [Adolescent victims of cyberbullying: Prevalence and characteristics]. Behavioral Psychology/Psicología Conductual, 18, 73–89.
�Fanti, K. A., Demetriou, A. G., & Hawa, V. V. (2012). A longitudinal study of cyberbullying: Examining risk and protective factors. European Journal of Developmental Psychology, 9, 168 –181. doi:10.1080/ 17405629.2011.643169
�Feldman, M. A. (2011). Cyber-bullying in high school: Associated indi- vidual and contextual factors of involvement (Doctoral dissertation). Available from Dissertation Abstracts International.
Fight Crime: Invest in Kids. (2006). Cyber Bully Teen. Retrieved from http://www.fightcrime.org/cyberbullying/cyberbullyingteen.pdf
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19, 468 – 483. doi:10.1177/ 0886260503262083
Fleming, M. J., Greentree, S., Cocotti-Muller, D., Elias, K. A., & Morrison, S. (2006). Safety in cyberspace: Adolescents’ safety and exposure on- line. Youth & Society, 38, 135–154. doi:10.1177/0044118X06287858
�Fredstrom, B. K., Adams, R. E., & Gilman, R. (2011). Electronic and school-based victimization: Unique contexts for adjustment difficulties during adolescence. Journal of Youth and Adolescence, 40, 405–415. doi:10.1007/s10964-010-9569-7
Genta, M., Brighi, A., & Guarini, A. (2009). European project on bullying and cyberbullying granted by Daphne II programme. Zeitschrift für Psychologie/Journal of Psychology, 217, 233. doi:10.1027/0044-3409 .217.4.233
Gentile, D. A., Coyne, S. M., & Bricolo, F. (2013). Pathological technol- ogy addictions: What is scientifically known and what remains to be learned. In K. E. Dill (Ed.), The Oxford handbook of media psychology (pp. 382–402). New York, NY: Oxford University Press.
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M. (2012). Cyber-incivility @ work: The new age of interpersonal deviance. Cyberpsychology, Behavior, and Social Net- working, 15, 148–154. doi:10.1089/cyber.2011.0336
�Goebert, D., Else, I., Matsu, C., Chung-Do, J., & Chang, J. Y. (2011). The impact of cyberbullying on substance use and mental health in a multi- ethnic sample. Maternal and Child Health Journal, 15, 1282–1286. doi:10.1007/s10995-010-0672-x
Goldweber, A., Waasdorp, T., & Bradshaw, C. P. (2013). Examining associations between race, urbanicity, and patterns of bullying involve- ment. Journal of Youth and Adolescence, 42, 206–219. doi:10.1007/ s10964-012-9843-y
�Gradinger, P., Strohmeier, D., Schiller, E., Stefanek, E., & Spiel, C. (2012). Cyber-victimization and popularity in early adolescence: Stabil- ity and predictive associations. European Journal of Developmental Psychology, 9, 228–243. doi:10.1080/17405629.2011.643171
�Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional bullying and cyberbullying: Identification of risk groups for adjustment problems. Zeitschrift für Psychologie/Journal of Psychology, 217, 205–213. doi: 10.1027/0044-3409.217.4.205
Gradinger, P., Strohmeier, D., & Spiel, C. (2010). Definition and measure- ment of cyberbullying. Cyberpsychology: Journal of Psychosocial Re- search on Cyberspace, 4, Article 1.
�Gradinger, P., Strohmeier, D., & Spiel, C. (2012). Motives for bullying others in cyberspace:A study on bullies and bully-victims in Austria. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 263–284). Malden, MA: Blackwell.
Gullone, E., & Robertson, N. (2008). The relationship between bullying and animal abuse behaviors in adolescents: The importance of witness- ing animal abuse. Journal of Applied Developmental Psychology, 29, 371–379. doi:10.1016/j.appdev.2008.06.004
Hatzenbuehler, M. L., & Keyes, K. M. (2013). Inclusive anti-bullying policies and reduced risk of suicide attempts in lesbian and gay youth. Journal of Adolescent Health, 53(1, Suppl.), S21–S26. doi:10.1016/j .jadohealth.2012.08.010
�Hay, C., & Meldrum, R. (2010). Bullying victimization and adolescent self-harm: Testing hypotheses from general strain theory. Journal of Youth and Adolescence, 39, 446–459. doi:10.1007/s10964-009-9502-0
Hay, C., Meldrum, R., & Mann, K. (2010). Traditional bullying, cyber bullying, and deviance: A general strain theory approach. Journal of Contemporary Criminal Justice, 26, 130 –147. doi:10.1177/ 10439862209359557
Hedges, L. V., & Vevea, J. L. (1996). Estimating effect size under publi- cation bias: Small sample properties and robustness of a random effects selection model. Journal of Educational and Behavioral Statistics, 21, 299–332. doi:10.3102/10769986021004299
Hedges, L. V., & Vevea, J. L. (1998). Fixed- and random-effects models in meta-analysis. Psychological Methods, 3, 486–504. doi:10.1037/1082- 989X.3.4.486
�Hemphill, S. A., Kotevski, A., Tollit, M., Smith, R., Herrenkohl, T. I., Toumbourou, J. W., & Catalano, R. F. (2012). Longitudinal predictors of
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
59CYBERBULLYING REVIEW AND META-ANALYSIS
cyber and traditional bullying perpetration in Australian secondary school students. Journal of Adolescent Health, 51, 59–65. doi:10.1016/ j.jadohealth.2011.11.019
Higgins, J. P. T., & Thompson, S. G. (2002). Quantifying heterogeneity in meta-analysis. Statistics in Medicine, 21, 1539–1558. doi:10.1002/sim .1186
Hinduja, S., & Patchin, J. W. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Vi- olence, 6, 89–112. doi:10.1300/J202v06n03_06
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Be- havior, 29, 129–156. doi:10.1080/01639620701457816
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Cor- win Press.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14, 206–221. doi:10.1080/13811118.2010 .494133
Hinduja, S., & Patchin, J. (2013). Social influences on cyberbullying behaviors among middle and high school students. Journal of Youth and Adolescence, 42, 711–722. doi:10.1007/s10964-012-9902-4
�Hines, H. N. (2011). Traditional bullying and cyberbullying: Are the impacts on self-concept the same? (Master’s thesis). Available from Dissertation Abstracts International.
Hitlin, P., & Rainie, L. (2005). Teens, technology, and school [Data memo]. Washington, DC: Pew Internet and American Life Project.
Hofstede, G. (2001). Culture’s consequences: Comparing values, behav- iors, institutions, and organizations across nations. Thousand Oaks, CA: Sage.
�Holfeld, B., & Grabe, M. (2012). An examination of the history, preva- lence, characteristics, and reporting of cyberbullying in the United States. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 117– 142). Malden, MA: Blackwell.
House, R. J., Hanges, P. M., Javidan, M., Dorfman, P., & Gupta, V. (2004). Culture, leadership and organizations: The GLOBE study of 62 societ- ies. Thousand Oaks, CA: Sage.
�Huang, Y., & Chou, C. (2010). An analysis of multiple factors of cyber- bullying among junior high school students in Taiwan. Computers in Human Behavior, 26, 1581–1590. doi:10.1016/j.chb.2010.06.005
Hunley-Jenkins, K. (2013). Principal perspectives about policy compo- nents and practices for reducing cyberbullying in urban schools (Doc- toral dissertation). Available from Dissertation Abstracts International.
�Hunt, C., Peters, L., & Rapee, R. M. (2012). Development of a measure of the experience of being bullied in youth. Psychological Assessment, 24, 156–165. doi:10.1037/a0025178
Hunter, J. E., & Schmidt, F. L. (2004). Methods of meta-analysis: Cor- recting error and bias in research findings (2nd ed.). Thousand Oaks, CA: Sage.
Hunter, S. C., Boyle, J. M. E., & Warden, D. (2007). Perceptions and correlates of peer-victimization and bullying. British Journal of Educa- tional Psychology, 77, 797–810. doi:10.1348/000709906X171046
�Johnson, C. (2012). An examination of the primary and secondary effects of cyber-bullying: Development and testing of a cyber-bullying moder- ator/mediator model (Doctoral dissertation). Available from Disserta- tion Abstracts International.
�Jose, P. E., Kljakovic, M., Scheib, E., & Notter, O. (2012). The joint development of traditional bullying and victimization with cyber bully- ing and victimization in adolescence. Journal of Research on Adoles- cence, 22, 301–309. doi:10.1111/j.1532-7795.2011.00764.x
Juvonen, J., & Gross, E. F. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78, 496–505. doi:10.1111/j.1746-1561.2008.00335.x
Kashdan, T. B., DeWall, C., Pond, R. R., Silvia, P. J., Lambert, N. M., Fincham, F. D., . . . Keller, P. S. (2013). Curiosity protects against interpersonal aggression: Cross-sectional, daily process, and behavioral evidence. Journal of Personality, 81, 87–102. doi:10.1111/j.1467-6494 .2012.00783.x
�Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the victims? A comparison of victimization in Internet chatrooms and victimization in school. Journal of Media Psychology, 21, 25–36. doi:10.1027/1864-1105.21.1.25
Kelleci, M., & Ìnal, S. (2010). Psychiatric symptoms in adolescents and Internet use: Comparison without Internet use. Cyberpsychology, Behav- ior, and Social Networking, 13, 191–194. doi:10.1089/cyber.2009.0026
�Kessel Schneider, S., O’Donnell, L., Stueve, A., & Coulter, R. W. S. (2012). Cyberbullying, school bullying, and psychological distress: A regional census of high school students. American Journal of Public Health, 102, 171–177. doi:10.2105/AJPH.2011.300308
Kiesler, S., Siegel, J., & McGuire, T. (1984). Social psychological aspects of computer-mediated communication. American Psychologist, 39, 1123–1134. doi:10.1037/0003-066X.39.10.1123
Kite, S. L., Gable, R., & Filippelli, L. (2010). Assessing middle school students’ knowledge of conduct and consequences and their behaviors regarding the use of social networking sites. The Clearing House, 83, 158–163. doi:10.1080/00098650903505365
�Klomek, A. B., Marrocco, F., Kleinman, M., Schonfeld, I. S., & Gould, M. S. (2008). Peer victimization, depression, and suicidality in adoles- cents. Suicide and Life-Threatening Behavior, 38, 166 –180. doi: 10.1521/suli.2008.38.2.166
Kokkinos, C. M., & Panayiotou, G. (2007). Parental discipline practices and locus of control: Relationship to bullying and victimization experi- ences of elementary school students. Social Psychology of Education, 10, 281–301. doi:10.1007/s11218-007-9021-3
�König, A., Gollwitzer, M., & Steffgen, G. (2010). Cyberbullying as an act of revenge? Australian Journal of Guidance and Counselling, 20, 210– 224. doi:10.1375/ajgc.20.2.210
Koo, H., Kwak, K., & Smith, P. K. (2008). Victimization in Korean schools: The nature, incidence, and distinctive features of Korean bul- lying or Wang-Ta. Journal of School Violence, 7, 119–139. doi:10.1080/ 15388220801974084
�Kowalski, R. M., & Fedina, C. (2011). Cyber bullying in ADHD and Asperger syndrome populations. Research in Autism Spectrum Disor- ders, 5, 1201–1208. doi:10.1016/j.rasd.2011.01.007
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Reese, H. (2012). Cyberbullying among college students: Evidence from multiple domains of college life. In C. Wankel & L. Wankel (Eds.), Misbehavior online in higher education (pp. 293–321). Bingley, United Kingdom: Emerald.
�Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6, Suppl.), S22–S30. doi:10.1016/j.jadohealth.2007.08.017
�Kowalski, R. M., & Limber, S. P. (2013). Psychological, physical, and academic correlates of cyberbullying and traditional bullying. Journal of Adolescent Health, 53, S13–S20. doi:10.1016/j.jadohealth.2012.09.018
Kowalski, R. M., Limber, S. E., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital age (2nd ed.). Malden, MA: Wiley-Blackwell.
�Kowalski, R. M., Morgan, C. A., & Limber, S. E. (2012). Traditional bullying as a potential warning sign of cyberbullying. School Psychology International, 33, 505–519. doi:10.1177/0143034312445244
�Kozlosky, R. (2009). Electronic bullying among adolescents (Doctoral dissertation). Available from Dissertation Abstracts International.
Lam, L. T., Cheng, Z., & Liu, X. (2013). Violent online games exposure and cyberbullying/victimization among adolescents. Cyberpsychology, Behavior, and Social Networking, 16, 159–165. doi:10.1089/cyber.2012 .0087
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
60 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
�Lam, L. T., & Li, Y. (2013). The validation of the E-Victimisation Scale (E-VS) and the E-Bullying Scale (E-BS) for adolescents. Computers in Human Behavior, 29, 3–7. doi:10.1016/j.chb.2012.06.021
Law, D. M., Shapka, J. D., Domene, J. F., & Gagné, M. H. (2012). Are cyberbullies really bullies? An investigation of reactive and proactive online aggression. Computers in Human Behavior, 28, 664–672. doi: 10.1016/j.chb.2011.11.013
Law, D. M., Shapka, J. D., Hymel, S., Olson, B. F., & Waterhouse, T. (2012). The changing face of bullying: An empirical comparison be- tween traditional and Internet bullying and victimization. Computers in Human Behavior, 28, 226–232. doi:10.1016/j.chb.2011.09.004
Lazuras, L., Barkoukis, V., Ourda, D., & Tsorbatzoudis, H. (2013). A process model of cyberbullying in adolescence. Computers in Human Behavior, 29, 881–887. doi:10.1016/j.chb.2012.12.015
Lenhart, A. (2007). Cyberbullying. Retrieved from http://pewInternet.org/ Reports/2007/Cyberbullying.aspx
Lenhart, A. (2010, May 6). Cyberbullying: What the research is telling us. Retrieved from http://www.pewInternet.org/Presentations/2010/May/ Cyberbullying-2010.aspx
�Lester, L., Cross, D., & Shaw, T. (2012). Problem behaviours, traditional bullying and cyberbullying among adolescents: Longitudinal analyses. Emotional and Behavioural Difficulties, 17, 435–447. doi:10.1080/ 13632752.2012.704313
�Leung, N. (2010). Online game playing and early adolescents’ online friendship and cyber-victimization (Doctoral dissertation). Retrieved from Dissertation Abstracts International.
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27, 157–170. doi:10.1177/ 0143034306064547
Li, Q. (2007a). Bullying in the new playground: Research into cyberbul- lying and cyber victimization. Australasian Journal of Educational Technology, 23, 435–454.
Li, Q. (2007b). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23, 1777–1791. doi:10.1016/j .chb.2005.10.005
�Li, Q. (2008). A cross-cultural comparison of adolescents’ experience related to cyberbullying. Educational Research, 50, 223–234. doi: 10.1080/00131880802309333
Li, Q. (2010). Cyberbullying in high schools: A study of students’ behav- iors and beliefs about this new phenomenon. Journal of Aggression, Maltreatment & Trauma, 19, 372–392. doi:10.1080/ 10926771003788979
Li, Q., Smith, P., & Cross, D. (2012). Research into cyberbullying: Con- text. In Q. Li, D. Cross, & P. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 3–12). Mal- den, MA: Blackwell.
Lim, V. K. G., & Teo, T. S. H. (2009). Mind your E-manners: Impact of cyber incivility on employees’ work attitude and behavior. Information & Management, 46, 419–425. doi:10.1016/j.im.2009.06.006
Lipsey, M. W., & Wilson, D. W. (2001). Practical meta-analysis. Thou- sand Oaks, CA: Sage.
Livingstone, S., & Haddon, L. (2009). EU Kids Online. Zeitschrift für Psychologie/Journal of Psychology, 217, 236–239.
�MacDonald, C. D., & Roberts-Pittman, B. (2010). Cyberbullying among college students: Prevalence and demographic differences. Procedia Social and Behavioral Sciences, 9, 2003–2009. doi:10.1016/j.sbspro .2010.12.436
�Machmutow, K., Perren, S., Sticca, F., & Alsaker, F. D. (2012). Peer victimisation and depressive symptoms: Can specific coping strategies buffer the negative impact of cybervictimisation? Emotional and Behav- ioural Difficulties, 17, 403–420. doi:10.1080/13632752.2012.704310
Madden, M., & Jones, S. (2008, September 24). Networked workers: Most workers use the Internet or e-mail at their jobs, but they say these
technologies are a mixed blessing for them. Retrieved from http://www .pewInternet.org
�Marsh, L., McGee, R., Nada-Raja, S., & Williams, S. (2010). Brief report: Text bullying and traditional bullying among New Zealand secondary school students. Journal of Adolescence, 33, 237–240. doi:10.1016/j .adolescence.2009.06.001
Mason, K. L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45, 323–348. doi:10.1002/pits .20301
Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior, and Social Networking, 13, 263–268. doi:0.1089�cyber.2009.0221
�Menesini, E., Calussi, P., & Nocentini, A. (2012). Cyberbullying and traditional bullying: Unique, additive, and synergistic effects on psycho- logical health symptoms. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research on international perspectives (pp. 245–262). Malden, MA: Blackwell.
Menesini, E., Modena, M., & Tani, F. (2009). Bullying and victimization in adolescence: Concurrent and stable roles and psychological health symptoms. Journal of Genetic Psychology, 170, 115–133. doi:10.3200/ GNTP.170.2.115-134
Menesini, E., & Nocentini, A. (2009). Cyberbullying definition and mea- surement: Some critical considerations. Zeitschrift für Psychologie/ Journal of Psychology, 217, 230–232. doi:10.1027/0044-3409.217.4 .230
�Menesini, E., Nocentini, A., & Calussi, P. (2011). The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, Behavior, and Social Networking, 14, 267–274. doi:10.1089/cyber.2010.0002
�Menesini, E., Nocentini, A., & Camodeca, M. (2013). Morality, values, traditional bullying, and cyberbullying in adolescence. British Journal of Developmental Psychology, 31, 1–14. Advance online publication. doi: 10.1111/j.2044-835X.2011.02066.x
Menesini, E., Nocentini, A., & Fonzi, A. (2007). Analisi longitudinale e differenze di genere nei comportamenti aggressivi in adolescenza [Lon- gitudinal and differential analysis of gender in aggressive behaviors during adolescence]. Età Evolutiva, 87, 78–85.
Menesini, E., Sanchez, V., Fonzi, A., Ortega, R., Costabile, A., & Lo Feudo, G. (2003). Moral emotions and bullying: A cross-national com- parison of differences between bullies, victims, and outsiders. Aggres- sive Behavior, 29, 515–530. doi:10.1002/ab.10060
Mesch, G. S. (2009). Parental mediation, online activities, and cyberbul- lying. CyberPsychology & Behavior, 12, 387–393. doi:10.1089/cpb .2009.0068
Mishna, F. (2003). Learning disabilities and bullying: Double jeopardy. Journal of Learning Disabilities, 36, 336 –347. doi:10.1177/ 00222194030360040501
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyber bullying behaviors among middle and high school students. American Journal of Orthopsychiatry, 80, 362–374. doi:10.1111/j.1939-0025.2010 .01040.x
�Mishna, F., Khoury-Kassabri, M., Gadalla, T., & Daciuk, J. (2012). Risk factors for involvement in cyber bullying: Victims, bullies and bully– victims. Children and Youth Services Review, 34, 63–70. doi:10.1016/j .childyouth.2011.08.032
Mishna, F., Saini, M., & Solomon, S. (2009). Ongoing and online: Children and youth’s perceptions of cyberbullying. Children and Youth Services Review, 31, 1222–1228. doi:10.1016/j.childyouth.2009.05.004
Mitchell, K. J., Finkelhor, D., Wolak, J., Ybarra, M. L., & Turner, H. (2011). Youth Internet victimization in a broader victimization context. Journal of Adolescent Health, 48, 128–134. doi:10.1016/j.jadohealth .2010.06.009
Mitchell, K. J., Ybarra, M., & Finkelhor, D. (2007). The relative impor- tance of online victimization in understanding depression, delinquency,
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
61CYBERBULLYING REVIEW AND META-ANALYSIS
and substance use. Child Maltreatment, 12, 314–324. doi:10.1177/ 1077559507305996
�Mitchell, M. (2011). Cyberbullying and academic achievement: Research into the rates of incidence, knowledge of consequences, and behavioral patterns of cyberbullying (Doctoral dissertation). Available from Dis- sertation Abstracts International.
�Monks, C. P., Robinson, S., & Worlidge, P. (2012). The emergence of cyberbullying: A survey of primary school pupils’ perceptions and experiences. School Psychology International, 33, 477– 491. doi: 10.1177/0143034312445242
Monks, C. P., & Smith, P. K. (2006). Definitions of bullying: Age differ- ences in understanding of the term, and the role of experience. British Journal of Developmental Psychology, 24, 801– 821. doi:10.1348/ 026151005X82352
Moore, M. J., Nakano, T., Enomoto, A., & Suda, T. (2012). Anonymity and roles associated with aggressive posts in an online forum. Computers in Human Behavior, 28, 861–867. doi:10.1016/j.chb.2011.12.005
�Moore, P., Huebner, E. E., & Hills, K. (2012). Electronic bullying and victimization and life satisfaction in middle school students. Social Indicators Research, 107, 429–447. doi:10.1007/s11205-011-9856-z
Murphy, K. R., & Davidshofer, D. O. (2005). Psychological testing: Principles and applications (6th ed.). Upper Saddle River, NJ: Pearson.
Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among U.S. youth: Prevalence and association with psychosocial adjustment. JAMA: Journal of the American Medical Association, 285, 2094–2100. doi:10.1001/jama.285 .16.2094
National Childrens Home & Tesco Mobile. (2005). Putting u in the picture: Mobile bullying survey 2005. Retrieved from www.filemaker .co.uk/educationcentre/.../Mobile_bullying_report.pdf
�Navarro, R., Serna, C., Martínez, V., & Ruiz-Oliva, R. (2013). The role of Internet use and parental mediation on cyberbullying victimization among Spanish children from rural public schools. European Journal of Psychology of Education, 28, 725–745. doi:10.1007/s10212-012-0137-2
�Navarro, R., Yubero, S., Larrañaga, E., & Martínez, V. (2012). Children’s cyberbullying victimization: Associations with social anxiety and social competence in a Spanish sample. Child Indicators Research, 5, 281– 295. doi:10.1007/s12187-011-9132-4
O’Brennan, L. M., Bradshaw, C. P., & Sawyer, A. L. (2009). Examining developmental differences in the social-emotional problems among fre- quent bullies, victims, and bully/victims. Psychology in the Schools, 46, 100–115. doi:10.1002/pits.20357
Olweus, D. (1993). Bullying at school: What we know and what we can do. New York, NY: Blackwell.
Olweus, D. (2012). Cyberbullying: An overrated phenomenon? European Journal of Developmental Psychology, 9, 520 –538. doi:10.1080/ 17405629.2012.682358
Olweus, D. (2013). School bullying: Development and some important challenges. Annual Review of Clinical Psychology, 9, 751–780. doi: 10.1146/annurev-clinpsy-050212-185516
Olweus, D., & Limber, S. P. (2010, November). What do we know about bullying: Information from the Olweus Bullying Questionnaire. Paper presented at the meeting of the International Bullying Prevention Asso- ciation, Seattle, WA.
�O’Moore, M. (2012). Cyber-bullying: The situation in Ireland. Pastoral Care in Education, 30, 209–223. doi:10.1080/02643944.2012.688065
Orobko, A. (2010). An examination of policies, programs, and strategies that address bullying in Virginia public school systems (Doctoral dis- sertation). Available from Dissertation Abstracts International.
�Ortega, R., Elipe, P., & Calmaestra, J. (2009). Emociones de agresores y víctimas de cyberbullying: Un estudio preliminar en estudiantes de secundaria [Emotions of perpetrators and victims of cyberbullying: A preliminary study of secondary school pupils]. Ansiedad y Estrés, 15, 151–165.
�Ortega, R., Elipe, P., Mora-Merchán, J. A., Calmaestra, J., & Vega, E. (2009). The emotional impact on victims of traditional bullying and cyberbullying: A study of Spanish adolescents. Zeitschrift für Psycholo- gie/Journal of Psychology, 217, 197–204. doi:10.1027/0044-3409.217.4 .197
Parker, J. G., Low, C. M., Walker, A. R., & Gamm, B. K. (2005). Friendship jealousy in young adolescents: Individual differences and links to sex, self-esteem, aggression, and social adjustment. Develop- mental Psychology, 41, 235–250. doi:10.1037/0012-1649.41.1.235
Parris, L., Varjas, K., Meyers, J., & Cutts, H. (2012). High school students’ perceptions of coping with cyberbullying. Youth & Society, 44, 284– 306. doi:10.1177/0044118X11398881
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Jus- tice, 4, 148–169. doi:10.1177/1541204006286288
�Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self-esteem. Journal of School Health, 80, 614–621. doi:10.1111/j.1746-1561.2010 .00548.x
�Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A test of general strain theory. Youth & Society, 43, 727–751. doi:10.1177/0044118X10366951
Patchin, J. W., & Hinduja, S. (2012). Cyberbullying: An update and synthesis of the research. In J. W. Patchin & S. Hinduja (Eds.), Cyber- bullying prevention and response: Expert perspectives (pp. 13–36). New York, NY: Routledge.
Paul, S., Smith, P. K., & Blumberg, H. H. (2010). Addressing cyberbul- lying in school using the quality circle approach. Australian Journal of Guidance and Counselling, 20, 157–168. doi:10.1375/ajgc.20.2.157
Paul, S., Smith, P. K., & Blumberg, H. H. (2012). Revisiting cyberbullying in schools using the quality circle approach. School Psychology Inter- national, 33, 492–504. doi:10.1177/0143034312445243
Pearson, C. M., Andersson, L. M., & Porath, C. L. (2005). Workplace incivility. In S. Fox & P. E. Spector (Eds.), Counterproductive work behavior: Investigations of actors and targets (pp. 177–200). doi: 10.1037/10893-008
�Pergolizzi, F., Richmond, D., Macario, S., Gan, Z., Richmond, C., & Macario, E. (2009). Bullying in middle schools: Results from a four- school survey. Journal of School Violence, 8, 264–279. doi:10.1080/ 15388220902910839
�Perren, S., Dooley, J., Shaw, T., & Cross, D. (2010). Bullying in school and cyberspace: Associations with depressive symptoms in Swiss and Australian adolescents. Child and Adolescent Psychiatry and Mental Health, 4, Article 28. doi:10.1186/1753-2000-4-28
�Perren, S., & Gutzwiller-Helfenfinger, E. (2012). Cyberbullying and tra- ditional bullying in adolescence: Differential roles of moral disengage- ment, moral emotions, and moral values. European Journal of Devel- opmental Psychology, 9, 195–209. doi:10.1080/17405629.2011.643168
Pigott, T. D. (2009). Handling missing data. In H. Cooper, L. V. Hedges, & J. C. Valentine (Eds.), The handbook of research synthesis and meta-analysis (pp. 399–416). New York, NY: Russell Sage Foundation.
�Pilkey, J. K. (2012). The nature and impact of cyberbullying on the middle school student (Doctoral dissertation). Available from Dissertation Ab- stracts International.
Pontzer, D. (2010). A theoretical test of bullying behavior: Parenting, personality, and the bully/victim relationship. Journal of Family Vio- lence, 25, 259–273. doi:10.1007/s10896-009-9289-5
Popovic-Citic, B., Djuric, S., & Cvetkovic, V. (2011). The prevalence of cyberbullying among adolescents: A case study of middle schools in Serbia. School Psychology International, 32, 412–424. doi:10.1177/ 0143034311401700
�Pornari, C. D., & Wood, J. (2010). Peer and cyber aggression in secondary school students: The role of moral disengagement, hostile attribution bias, and outcome expectancies. Aggressive Behavior, 36, 81–94. doi: 10.1002/ab.20336
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
62 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
Postmes, T., & Spears, R. (1998). Deindividuation and antinormative behavior: A meta-analysis. Psychological Bulletin, 123, 238–259. doi: 10.1037/0033-2909.123.3.238
Power, J. L., Brotheridge, C. M., Blenkinsopp, J., Bowes-Sperry, L., Bozionelos, N., Buzády, Z., . . . Nnedumm, A. (2013). Acceptability of workplace bullying: A comparative study on six continents. Journal of Business Research, 66, 374–380. doi:10.1016/j.jbusres.2011.08.018
Privitera, C., & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bullying? CyberPsychology & Behavior, 12, 395–400. doi: 10.1089/cpb.2009.0025
�Pure, R. A., & Metzger, M. J. (2012). The outcomes of online and offline victimization by sex: Males’ and females’ reactions to cyberbullying versus traditional bullying. Manuscript submitted for publication.
Pyzalski, J. (2011). Electronic aggression among adolescents: An old house with a new façade (or even a number of houses). In C. Halligan, E. Dunkels, & G.-M. Franberg (Eds.), Youth culture and net culture: Online social practices (pp. 278–295). Hershey, PA: IGI Global.
�Raskauskas, J. (2010). Text-bullying: Associations with traditional bully- ing and depression among New Zealand adolescents. Journal of School Violence, 9, 74–97. doi:10.1080/15388220903185605
�Raskauskas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying among adolescents. Developmental Psychology, 43, 564–575. doi:10.1037/0012-1649.43.3.564
�Riebel, J., Jäger, R. S., & Fischer, U. C. (2009). Cyberbullying in Germany—An exploration of prevalence, overlapping with real life bullying and coping strategies. Psychology Science Quarterly, 51, 298– 314.
Rivers, I. (2013). What to measure? In S. Bauman, D. Cross, & J. Walker (Eds.), Principles of cyberbullying research: Definitions, measures, and methods (pp. 222–237). New York, NY: Routledge.
�Rivers, I., & Noret, N. (2010). “I h8 u”: Findings from a five-year study of text and email bullying. British Educational Research Journal, 36, 643–671. doi:10.1080/01411920903071918
�Şahin, M. (2012). The relationship between the cyberbullying/ cybervictimization and loneliness among adolescents. Children and Youth Services Review, 34, 834–837. doi:10.1016/j.childyouth.2012.01 .010
�Şahin, M., Sari, S. V., & Şafak, Z. (2010). Examining relationship between being cyber bully/cyber victim and social perceptual levels of adolescents. International Journal of Human Sciences, 7, 1059–1067.
�Sakellariou, T., Carroll, A., & Houghton, S. (2012). Rates of cyber victimization and bullying among male Australian primary and high school students. School Psychology International, 33, 533–549. doi: 10.1177/0143034311430374
�Salmivalli, C., & Poyhonen, V. (2012). Cyberbullying in Finland. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global play- ground: Research from international perspectives (pp. 57–72). Chices- ter, United Kingdom: Wiley-Blackwell.
�Sbarbaro, V., & Enyeart Smith, T. (2011). An exploratory study of bullying and cyberbullying behaviors among economically/education- ally disadvantaged middle school students. American Journal of Health Studies, 26, 139–151.
�Schenk, A. M. (2011). Psychological impact of cyberbully victimization among college students (Master’s thesis). Available from Dissertation Abstracts International.
Schenk, A. M., & Fremouw, W. J. (2012). Prevalence, psychological impact, and coping of cyberbully victims among college students. Jour- nal of School Violence, 11, 21–37. doi:10.1080/15388220.2011.630310
�Schoffstall, C. L., & Cohen, R. (2011). Cyber aggression: The relation between online offenders and offline social competence. Social Devel- opment, 20, 587–604. doi:10.1111/j.1467-9507.2011.00609.x
Schultze-Krumbholz, A., & Scheithauer, H. (2009a, August). Measuring cyberbullying and cybervictimisation by using behavioral categories— The Berlin Cyberbullying Cybervictimisation Questionnaire (BCyQ).
Poster presented at the postconference workshop of COST (Action IS0801), Vilnius, Lithuania.
�Schultze-Krumbholz, A., & Scheithauer, H. (2009b). Social-behavioral correlates of cyberbullying in a German student sample. Zeitschrift für Psychologie/Journal of Psychology, 217, 224–226. doi:10.1027/0044- 3409.217.4.224
Sengupta, A., & Chaudhuri, A. (2011). Are social networking sites a source of online harassment for teens? Evidence from survey data. Children and Youth Services Review, 33, 284–290. doi:10.1016/j.childyouth.2010.09 .011
�Ševčíková, A., & Šmahel, D. (2009). Online harassment and cyberbully- ing in the Czech Republic: Comparison across age groups. Zeitschrift für Psychologie/Journal of Psychology, 217, 227–229. doi:10.1027/0044- 3409.217.4.227
Ševčíková, A., Šmahel, D., & Otavová, M. (2012). The perception of cyberbullying in adolescent victims. Emotional and Behavioural Diffi- culties, 17, 319–328. doi:10.1080/13632752.2012.704309
Shapka, J. D., & Law, D. M. (2013). Does one size fit all? Ethnic differences in parenting behaviors and motivations for adolescent en- gagement in cyberbullying. Journal of Youth and Adolescence, 42, 723–738. doi:10.1007/s10964-013-9928-2
Sijtsema, J. J., Veenstra, R., Lindenberg, S., & Salmivalli, C. (2009). Empirical test of bullies’ status goals: Assessing direct goals, aggression, and prestige. Aggressive Behavior, 35, 57–67. doi:10.1002/ab.20282
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154. doi: 10.1111/j.1467-9450.2007.00611.x
�Slonje, R., Smith, P. K., & Frisén, A. (2012). Processes of cyberbullying, and feelings of remorse by bullies: A pilot study. European Journal of Developmental Psychology, 9, 244–259. doi:10.1080/17405629.2011 .643670
Slonje, R., Smith, P. K., & Frisén, A. (2013). The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior, 29, 26– 32. doi:10.1016/j.chb.2012.05.024
Smith, P. K., Cowie, H., Olafsson, R., & Liefooghe, A. P. D. (2002). Definitions of bullying: A comparison of terms used and age and sex differences in a 14-country international comparison. Child Develop- ment, 73, 1119–1133. doi:10.1111/1467-8624.00461
Smith, P. K., del Barrio, C., & Tokunaga, R. (2012). Definitions of bullying and cyberbullying: How useful are the terms? In S. Bauman, D. Cross, & J. Walker (Eds.), Principles of cyberbullying research: Defi- nition, measures, and methods (pp. 29–40). Philadelphia, PA: Rout- ledge.
Smith, P. K., Kupferberg, A., Mora-Merchan, J. A., Samara, M., Bosley, S., & Osborn, R. (2012). A content analysis of school anti-bullying policies: A follow-up after six years. Educational Psychology in Prac- tice, 28, 47–70. doi:10.1080/02667363.2011.639344
�Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385. doi:10.1111/j.1469-7610.2007.01846.x
Smith, T. (2012, January). Cyberbullying: A world-wide problem. Re- trieved from http://www.cbronline.com/news/cyberbullying-a-world- wide-problem-160112
Snell, P. A., & Englander, E. (2010). Cyberbullying victimization and behaviors among girls: Applying research findings in the field. Journal of Social Sciences, 6, 510–514. doi:10.3844/jssp.2010.510.514
Solberg, M., & Olweus, D. (2003). Prevalence estimation of school bul- lying with the Olweus Bully/Victim Questionnaire. Aggressive Behav- ior, 29, 239–268. doi:10.1002/ab.10047
Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., . . . Henenius, H. (2010). Psychosocial risk factors associated with cyberbullying among adolescents. Archives of General Psychiatry, 67, 720–728. doi:10.1001/archgenpsychiatry.2010.79
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
63CYBERBULLYING REVIEW AND META-ANALYSIS
Sowislo, J. F., & Orth, U. (2013). Does low self-esteem predict depression and anxiety? A meta-analysis of longitudinal studies. Psychological Bulletin, 139, 213–240. doi:10.1037/a0028931
Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes and screens: Insights into the human dimension of covert and cyberbul- lying. Zeitschrift für Psychologie/Journal of Psychology, 217, 189–196. doi:10.1027/0044-3409.217.4.189
�Stanton, L. (2012). National study concerning bullying: Prevalence rates and associated psychological and behavioural consequences (Doctoral dissertation). Available from Dissertation Abstracts International.
Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online victimization? Effects of victim’s personality and properties of the incident. European Journal of Developmental Psychology, 9, 260–274. doi:10.1080/17405629.2011.643170
�Steffgen, G., König, A., Pfetsch, J., & Melzer, A. (2011). Are cyberbullies less empathic? Adolescents’ cyberbullying behavior and empathic re- sponsiveness. Cyberpsychology, Behavior, and Social Networking, 14, 643–648. doi:10.1089/cyber.2010.0445
�Strohmeier, D., Kärnä, A., & Salmivalli, C. (2011). Intrapersonal and interpersonal risk factors for peer victimization in immigrant youth in Finland. Developmental Psychology, 47, 248 –258. doi:10.1037/ a0020785
�Sumter, S. R., Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2012). Developmental trajectories of peer victimization: Off-line and online experiences during adolescence. Journal of Adolescent Health, 50, 607– 613. doi:10.1016/j.jadohealth.2011.10.251
�Taiariol, J. (2010). Cyberbullying: The role of family and school (Doctoral dissertation). Available from Dissertation Abstracts International.
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyber bullying victimization. Com- puters in Human Behavior, 26, 277–287. doi:10.1016/j.chb.2009.11.014
�Topçu, Ç., & Erdur-Baker, Ö. (2010). The Revised Cyber Bullying Inventory (RCBI): Validity and reliability studies. Procedia Social and Behavioral Sciences, 5, 660–664. doi:10.1016/j.sbspro.2010.07.161
�Topçu, Ç., & Erdur-Baker, Ö. (2012). Affective and cognitive empathy as mediators of gender differences in cyber and traditional bullying. School Psychology International, 33, 550 –561. doi:10.1177/ 0143034312446882
�Topçu, C., Erdur-Baker, Ö., & Çapa-Aydin, Y. (2008). Examination of cyberbullying experiences among Turkish students from different school types. CyberPsychology & Behavior, 11, 643–648. doi:10.1089/cpb .2007.0161
Turner, H. A., Finkelhor, D., Hamby, S. L., Shattuck, A., & Ormrod, R. K. (2011). Specifying type and location of peer victimization in a national sample of children and youth. Journal of Youth and Adolescence, 40, 1052–1067. doi:10.1007/s10964-011-9639-5
Twyman, K., Saylor, C., Taylor, L. A., & Comeaux, C. (2010). Comparing children and adolescents engaged in cyberbullying to matched peers. Cyberpsychology, Behavior, and Social Networking, 13, 195–199. doi: 10.1089/cyber.2009.0137
�Tynes, B., Rose, A., & Williams, D. (2010). The development and validation of the OnlineVictimization Scale for Adolescents. Cyberpsy- chology: Journal of Psychosocial Research on Cyberspace, 4, Article 1.
�Ubertini, M. (2011). Cyberbullying may reduce adolescent’s well-being: Can life satisfaction and social support protect them? (Doctoral disser- tation). Available from Dissertation Abstracts International.
Vaillancourt, T., Trinh, V., McDougall, P., Duku, E., Cunningham, L., Cunningham, C., . . . Short, K. (2010). Optimizing population screening of bullying in school-aged children. Journal of School Violence, 9, 233–250. doi:10.1080/15388220.2010.483182
Vandebosch, H., & Van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11, 499–503. doi:10.1089/cpb.2007.0042
�Vandebosch, H., & Van Cleemput, K. (2009). Cyberbullying among youngsters: Profiles of bullies and victims. New Media & Society, 11, 1349–1371. doi:10.1177/1461444809341263
�Vannucci, M., Nocentini, A., Mazzoni, G., & Menesini, E. (2012). Re- calling unpresented hostile words: False memories predictors of tradi- tional and cyberbullying. European Journal of Developmental Psychol- ogy, 9, 182–194. doi:10.1080/17405629.2011.646459
�Varjas, K., Henrich, C. C., & Meyers, J. (2009). Urban middle school students’ perceptions of bullying, cyberbullying, and school safety. Journal of School Violence, 8, 159 –176. doi:10.1080/ 15388220802074165
Varjas, K., Talley, J., Meyers, J., Parris, L., & Cutts, H. (2010). High school students’ perceptions of motivations for cyberbullying: An ex- ploratory study. Western Journal of Emergency Medicine, 11, 269–273.
�Vazsonyi, A. T., Machackova, H., Sevcikova, A., Smahel, D., & Cerna, A. (2012). Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Devel- opmental Psychology, 9, 210–227. doi:10.1080/17405629.2011.644919
Viechtbauer, W. (2005). Bias and efficiency of meta-analytic variance estimators in the random-effects model. Journal of Educational and Behavioral Statistics, 30, 261–293. doi:10.3102/10769986030003261
von Marées, N., & Petermann, F. (2012). Cyberbullying: An increasing challenge for schools. School Psychology International, 33, 467–476. doi:10.1177/0143034312445241
�Wachs, S. (2012). Moral disengagement and emotional and social diffi- culties in bullying and cyberbullying: Differences by participant role. Emotional and Behavioral Difficulties, 17, 347–360. doi:10.1080/ 13632752.2012.704318
�Wachs, S., & Wolf, K. D. (2011). Correlates of cyberbullying and bully- ing: First results of a self-report study. Praxis der Kingerpsychologie und Kinderpsychiatrie, 60, 735–744.
�Wachs, S., Wolf, K. D., & Pan, C. (2012). Cybergrooming: Risk factors, coping strategies and associations with cyberbullying. Psicothema, 24, 628–633.
�Wade, A., & Beran, T. (2011). Cyberbullying: The new era of bullying. Canadian Journal of School Psychology, 26, 44–61. doi:10.1177/ 0829573510396318
�Walrave, M., & Heirman, W. (2011). Cyberbullying: Predicting victimi- sation and perpetration. Children & Society, 25, 59–72. doi:10.1111/j .1099-0860.2009.00260.x
Wang, J., Iannotti, R. J., & Luk, J. W. (2010). Bullying victimization among underweight and overweight U.S. youth: Differential associa- tions for boys and girls. Journal of Adolescent Health, 47, 99–101. doi:10.1016/j.jadohealth.2009.12.007
�Wang, J., Iannotti, R. J., Luk, J. W., & Nansel, T. R. (2010). Co- occurrence of victimization from five subtypes of bullying: Physical, verbal, social exclusion, spreading rumors, and cyber. Journal of Pedi- atric Psychology, 35, 1103–1112. doi:10.1093/jpepsy/jsq048
Wang, J., Iannotti, R. J., & Nansel, T. R. (2009). School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45, 368–375. doi:10.1016/j.jadohealth .2009.03.021
Wang, J., Nansel, T. R., & Iannotti, R. J. (2011). Cyber and traditional bullying: Differential association with depression. Journal of Adolescent Health, 48, 415–417. doi:10.1016/j.jadohealth.2010.07.012
�Werner, N. E., Bumpus, M. F., & Rock, D. (2010). Involvement in Internet aggression during early adolescence. Journal of Youth and Adolescence, 39, 607–619. doi:10.1007/s10964-009-9419-7
Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Champaign, IL: Research Press.
�Williams, K. R., & Guerra, N. G. (2007). Prevalence and predictors of Internet bullying. Journal of Adolescent Health, 41(6, Suppl.), S14–S21. doi:10.1016/j.jadohealth.2007.08.018
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
64 KOWALSKI, GIUMETTI, SCHROEDER, AND LATTANNER
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health, 41(6, Suppl.), S51–S58. doi:10.1016/j.jadohealth.2007.08.019
Yang, S. J., Stewart, R., Kim, J. M., Kim, S. W., Shin, I. S., Dewey, M. E., . . . Yoon, J. S. (2013). Differences in predictors of traditional and cyber-bullying: A 2-year longitudinal study in Korean school children. European Child & Adolescent Psychiatry, 22, 309–318. doi:10.1007/ s00787-012-0374-6
Ybarra, M. L. (2004). Linkages between depressive symptomatology and Internet harassment among young regular Internet users. CyberPsychol- ogy & Behavior, 7, 247–257. doi:10.1089/109493104323024500
Ybarra, M. L., Boyd, D., Korchmaros, J. D., & Oppenheim, J. (2012). Defining and measuring cyberbullying within the larger context of bullying victimization. Journal of Adolescent Health, 51, 53–58. doi: 10.1016/j.jadohealth.2011.12.031
�Ybarra, M. L., Diener-West, M., & Leaf, P. J. (2007). Examining the overlap in Internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health, 41(6, Suppl.), S42– S50. doi:10.1016/j.jadohealth.2007.09.004
Ybarra, M. L., Diener-West, M., Markow, D., Leaf, P. J., Hamburger, M., & Boxer, P. (2008). Linkages between Internet and other media violence with seriously violent behavior by youth. Pediatrics, 122, 929–937. doi:10.1542/peds.2007-3377
�Ybarra, M. L., Espelage, D. L., & Mitchell, K. J. (2007). The co- occurrence of Internet harassment and unwanted sexual solicitation
victimization and perpetration: Associations with psychosocial indica- tors. Journal of Adolescent Health, 41(6, Suppl.), S31–S41. doi:10.1016/ j.jadohealth.2007.09.010
Ybarra, M. L., & Mitchell, K. J. (2004a). Online aggressor/targets, aggres- sors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308–1316. doi: 10.1111/j.1469-7610.2004.00328.x
Ybarra, M. L., & Mitchell, K. J. (2004b). Youth engaging in online harassment: Associations with caregiver–child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27, 319–336. doi:10.1016/j.adolescence.2004.03.007
�Ybarra, M. L., & Mitchell, K. J. (2007). Prevalence and frequency of Internet harassment instigation: Implications for adolescent health. Jour- nal of Adolescent Health, 41, 189–195. doi:10.1016/j.jadohealth.2007 .03.005
Ybarra, M. L., Mitchell, K. J., Wolak, J., & Finkelhor, D. (2006). Exam- ining characteristics and associated distress related to Internet harass- ment: Findings from the Second Youth Internet Safety Survey. Pediat- rics, 118, e1169–e1177. doi:10.1542/peds.2006-0815
Yilmaz, H. (2011). Cyberbullying in Turkish middle schools: An explor- atory study. School Psychology International, 32, 645– 654. doi: 10.1177/0143034311410262
Received December 18, 2012 Revision received November 22, 2013
Accepted December 9, 2013 �
T hi
s do
cu m
en t
is co
py ri
gh te
d by
th e
A m
er ic
an Ps
yc ho
lo gi
ca l
A ss
oc ia
tio n
or on
e of
its al
lie d
pu bl
is he
rs .
T hi
s ar
tic le
is in
te nd
ed so
le ly
fo r
th e
pe rs
on al
us e
of th
e in
di vi
du al
us er
an d
is no
t to
be di
ss em
in at
ed br
oa dl
y.
65CYBERBULLYING REVIEW AND META-ANALYSIS
Testing Assumptions About Cyberbullying: Perceived Distress Associated With Acts of Conventional and Cyber Bullying
Sheri Bauman University of Arizona
Matthew L. Newman Arizona State University
Objective: Cyberbullying has received considerable attention, and experts have made several assumptions about this phenomenon. In particular, experts have speculated that the potential harm from cyberbullying is greater than that from conventional bullying, but this assumption has not been confirmed empirically. Method: In this study we tested this assumption by using a questionnaire with pairs of items describing similar experiences, one occurring in “traditional” ways and the other using digital technology. Respondents indicated the degree to which they would be upset by the incident on a scale from 1 (not at all upset) to 7 (extremely upset). Results: Findings from this study suggest that the distress associated with an incident of bullying is related to the nature of the bullying incident rather than the form. When comparing the parallel items, we discovered that although cyber- actions and conventional actions were significantly different for most pairs, the form that was more upsetting varied across items, providing further evidence that the form is not the distinguishing feature. Finally, we found significant gender differences on all subscales, with females reporting more distress than males. Conclusion: We close with a discussion of implications for both typologies of bullying and interventions designed to reduce bullying. Because cyberbullying may not be uniformly more harmful than other types of bullying, strategies to assist victims may be implemented with regard to the context and severity of the bullying, rather than its method of delivery.
Keywords: bullying, cyberbullying, factor analysis, distress
Cyberbullying— using information and communication technology (ICT) to inten- tionally harm a target by affecting his or her social status, relationships, and reputation— has garnered considerable attention from the popular media, largely in the form of reports of cases with extreme personal and/or legal consequences. Scholars have also begun to focus on this problem, but because the line of inquiry is so recent, there are variations in definitions, measures, and methodology that make it difficult to generalize across studies.
Experts have speculated on the consequences of being victimized by technology (e.g., Campbell, 2005), and a few empirical studies offer some clues. Hinduja and Patchin (2008) found that many victims of cyberbullying in their sample of online adolescents reported reactions such as frustration, anger, and sad- ness, although 35% indicated that they were not affected by their experience. Other re- searchers (Beran & Li, 2007; Cassidy, Jack- son, & Brown, 2009; Raskauskas & Stoltz, 2007; Tokunaga, 2010; Ybarra & Mitchell, 2004) revealed that victims reported fear of attending school, diminished concentration at school, disrupted school friendship, and even suicidal thoughts, as a response to cyberbul- lying. The relative psychosocial impact of cyberbullying compared with “traditional” bullying has been the subject of speculation, but no empirical studies to date have directly tested this question. The objective of the cur- rent study was to compare the degree of distress
This article was published Online First September 17, 2012. Sheri Bauman, College of Education, University of Ari-
zona; Matthew L. Newman, School of Social and Behav- ioral Sciences, Arizona State University.
We thank anonymous reviewers for comments on earlier drafts of this article.
Correspondence concerning this article should be ad- dressed to Sheri Bauman, P.O. Box 210069, College of Education, Tucson, AZ 85721-0069. E-mail: sherib@u .arizona.edu
Psychology of Violence © 2012 American Psychological Association 2013, Vol. 3, No. 1, 27–38 2152-0828/12/$12.00 DOI: 10.1037/a0029867
27
experienced by incidents of traditional and cy- berbullying that were similar in all respects other than the method of perpetration.
Various experts (Campbell, 2005; Hinduja & Patchin, 2009; Kowalski, Limber & Agatston, 2008; Slonje & Smith, 2008; Willard, 2007) have suggested that unique characteristics of cyberbullying magnify the potential harm to victims. The perception of anonymity may cre- ate an online disinhibition effect (Suler, 2004), which reduces the usual social sanctions against cruelty, and results in more hurtful comments. Hinduja and Patchin (2008) reported that 37% of teenage survey respondents admitted to say- ing things electronically they would not say in person. In addition to the potential for increased hurtfulness, being the recipient of an anony- mous attack may undermine the victim’s trust in others, because anyone (including friends) could be the attacker. Another characteristic that may increase the harm is the absence of time and space restrictions on the bully. Elec- tronic aggression can be perpetrated at any time from any place, denying the victim a safe sanc- tuary. Finally, the size of the audience can am- plify the humiliation. One well-known case (The “Star Wars Kid”; Star Wars Kid Files Lawsuit, 2003), involved posting (and eventu- ally “enhancing”) an embarrassing video not intended to be seen by anyone other than the person who made it. It was posted by others on YouTube and Internet forums, shared via e- mail, and viewed 900 million times (BBC News, 2006).
Although there has been a focus on K–12 in cyberbullying research, several studies have at- tempted to quantify the problem at the college level. Selwyn (2008) reported that 90% of 1,222 undergraduates in the United Kingdom ac- knowledged online misbehavior. In the United States, Finn (2004) found that 10%–15% of students at one university in the northeast expe- rienced repeated threatening, insulting, or ha- rassing electronic messages, with 7% receiving unwanted pornography. A study conducted at the University of Northern Iowa found that 34% of the (mostly White freshman female) students in the sample reported being victims of cyberbullying, with 19% of the 191 participants admitting to cyberbullying others and 64% re- porting they had observed incidents of cyber- bullying (Tegeler, 2010). Research by Allison Schenk at West Virginia University, with a
sample of 799 undergraduates (72% female), found that just under 9% of participants had been victimized by cyberbullying more than once; four of those indicated that they had made a suicide attempt. Those who had been victim- ized were more likely to report depression, anx- iety, and paranoia than those who were not (wvu today, 2011). The findings of yet another study of 439 college students (MacDonald & Roberts-Pittman, 2010) showed that about 22% had been cyberbullied, 9% had cyberbullied others, and 38% had observed cyberbullying. Englander (2007) reported that 8% of college students had been cyberbullied via instant mes- saging in college, and 3% admitted to being cyberbullies. Taken together, these studies sug- gest that the phenomenon of cyberbullying per- sists across all levels of schooling and into young adulthood.
Several typologies of conventional bullying have been widely adopted by social science researchers. A number of researchers have in- vestigated the differences between physical, verbal, and social/relational types of bullying/ victimization (e.g., Bauman & Del Rio, 2006; Craig, Henderson, & Murphy, 2000; Yoon & Kerber, 2003), whereas others researchers focus on the distinction between direct and indirect forms of bullying/victimization (e.g., Woods & Wolke, 2003). Differential responses by type of bullying have been detected in numerous stud- ies that have found that indirect bullying is more harmful than direct bullying (e.g., Baldry, 2004; Bauman, 2010; Bauman & Summers, 2009; Card, Stucky, Sawalani, & Little, 2008; Hawker & Boulton, 2000; Sharp, 1995; van der Wal, de Wit, & Hirasing, 2003). When cyberbullying first appeared on the radar, researchers assumed it was yet another distinct type of bullying. However, there is scant empirical evidence that cyberbullying is in fact a distinct construct from the more conventional forms (physical, verbal, and relational). Researchers often do not report psychometric properties of measures, but often analyze items about electronic forms of bully- ing as though they were separate constructs (see e.g., Wang, Nansel, & Ianotti, 2009).
Two previous studies have utilized a factor analytic approach in order to determine whether cyberbullying/victimization is a separate type. In both cases, items were added to an existing measure to reflect the technological context. Dempsey, Sulkowski, Nichols, and Storch
28 BAUMAN AND NEWMAN
(2009) added four items to the Revised Peer Experiences Questionnaire (Prinstein, Boergers, & Vernberg, 2001), which has overt and rela- tional bullying scales. The overt scale includes four items, three of which describe physical victimization and one of which involves being threatened with physical violence. The rela- tional items all reflect social exclusion. Three of the new cyber items refer to a technological action that “was mean or threatened me” and the fourth describes a situation in which a webpage was created that included “mean or embarrass- ing information and/or photos” about the vic- tim. Because none of the overt or relational items described “mean behavior” or the use of images, the fact that the scale was found to be a separate factor is not surprising. That is, the overt items all related to physical actions that had either occurred or been threatened, and re- lational items all described instances of social exclusion, whereas the cyber items described receiving communications (electronic, in these examples) that were mean or threatening (sim- ilar to verbal bullying, which was not included in the measure) or involved the creation of an embarrassing or mean webpage. Because the behaviors were so qualitatively different from those in the other scales—and because form of delivery was confounded with the level of de- tail—we cannot determine from this factor anal- ysis whether cyberbullying/victimization is re- ally a separate construct.
In a similar study conducted by Griezel, Cra- ven, Yeung, and Finger (2008), researchers added items to an existing scale (The Adoles- cent Peer Relations Instrument–Bully & Target; Parada, 2000) to reflect the technological envi- ronment. In this case, the existing measure had three subscales: Physical, Verbal, and Social. The six Verbal items involved name-calling, teasing, making rude comments, and the six Social items described social exclusion, ignor- ing, and persuading friends to reject the target. The result of a factor analysis revealed that the new items comprise two scales: Bully Visual and Bully Text. The five items in the Visual scale describe taking and/or sending embarrass- ing or hurtful video or images of the target, and the eight Text items include several items that closely parallel those in the Verbal scale, with the comments conveyed electronically. Some items, however, were different in important ways. For example, the Verbal item reads,
“Made jokes about a student,” whereas the Text item states, “Made nasty jokes about a student to my friends in an instant chat message [italics added].” The inclusion of the term “nasty” im- plies a more obviously harmful intent; a joke could be light-hearted and not hurtful. The word “nasty” is used in another item as well. One item refers to creating a fake profile on a web- site, and two items refer to using someone’s online accounts without permission, to which there is no parallel in other scales. As with the Dempsey et al. (2009) study, it is not clear whether the factors emerged because of the cyber-context or because the actions described are qualitatively different from those included in the other scales on the measure.
To avoid this problem, we developed a scale consisting of eight pairs of items, in which the actions are parallel but the context differs. For example, one item refers to showing naked pho- tos of the target to others at school, and the parallel item describes sending the photo to others using a cell phone. With this strategy, we hoped to avoid the possibility that factors would reflect different behaviors rather than the differ- ent environments (conventional or cyber) in which the actions were perpetrated.
Although self-report measures are widely used in bullying research, there are concerns about social desirability in responses. Research- ers debate whether global items are sufficient, whether definitions should be provided, and whether lists of behaviors are more useful for identifying offenders and targets. Researchers also prefer to have multiple informants when participants are to be classified into bullying status groups (bully, victim, bully/victim, by- stander). To avoid these problems, instead of reporting on their own experiences, we asked participants to imagine they were involved a variety of situations and to indicate how upset they would be in those situations. Vignettes (brief descriptions of scenarios that exemplify the concepts being studied) have been widely used in social science research (e.g., Brody, 1984; Crick, 1995; Flaskerud, 1979; Marsh, 1982; Mize & Ladd, 1988; Nelson & Crick, 1999; Slaby & Guerra, 1988) and in identifying emotional responses and attributions. The use of scenarios or vignettes in research has numerous advantages for bullying research (Bauman & Del Rio, 2006). In a study of the use of vignettes in qualitative research with children and young
29SPECIAL ISSUE: TESTING ASSUMPTIONS ABOUT CYBERBULLYING
people, this technique was found to be engaging for participants and allowed them to explore sensitive issues, such as sexual harassment and bullying, which may not be tapped using stan- dard methods (Barter & Renhold, 2000). Vi- gnettes allow for depersonalization (Schoen- berg & Ravdal, 2000), which is important for sensitive topics such as bullying and cyberbul- lying. Responding to hypothetical scenarios al- lows the respondent to remain safe from any personal threat. Poulou (2001) speculated that participants are less likely to be influenced by social desirability because they are not reveal- ing their own personal experiences. Poulou noted that not only do vignettes tend to engage participants’ interest and imagination, but this method also increases the internal validity of studies by increasing researchers’ control over variables.
Research on cyberbullying to date has been guided by the assumption that its conse- quences are worse than those of conventional bullying (e.g., see Campbell, 2005). In the current study, our goal was to test this as- sumption by assessing differences in distress caused by victimization via conventional and cyberbullying incidents. We examined tradi- tional-age college students’ perceptions of the relative distress caused by conventional ver- sus cyberbullying experiences and investi- gated variations in the subscale scores by gender. Thus, our hypothesis, based on as- sumptions in the extant literature, was that victimization by cyberbullying will be more upsetting to participants than comparable conventional victimization experiences.
In addition, we explored the association between prior victimization history and per- ceived distress resulting from both forms of bullying. Previous research has demonstrated biases in social information processing (cf. Crick & Dodge, 1994) among victims of bul- lying, such that victims are more prone to making hostile attributions about ambiguous b e h a v i o r s ( e . g . , C a m o d e c a , G o o s s e n s , Meerum Terwogt, & Schuengel, 2002; Salmivalli & Nieminen, 2002). For the pur- poses of the present study, prior victimization history might lead participants to interpret all of the bullying behaviors as more harmful, so it was included as a potential covariate in our hypothesis testing.
Method
Participants
Participants were 588 students (76% female) at a large southwestern university. Age ranged from 17 to 25, with a mean of 19.8 (SD � 1.41); participants included freshman through seniors. About 45% of participants were born in the city where the university is located, 10% were born elsewhere in the state, 35% were natives of other U.S. states, and 9% reported other na- tional origin. The majority of participants self- identified as White (66%), with the remainder being African American/Black (7%), Hispanic/ Latino (17%), Native American (4%), and Pa- cific Islander/Asians (1%). Five percent of par- ticipants indicated “other” ethnicity. This distri- bution mirrors that of the campus as a whole.
Procedure
Students in psychology classes at a large ur- ban southwestern university were recruited via an online subject pool system, which provided several options for fulfilling students’ course research requirement. Importantly, this survey was advertised as a study of “social attitudes” and deliberately did not mention bullying until the debriefing. Participants completed the mea- sures online, with each person taking about 15 min to do the entire survey. Informed consent was obtained at the beginning of the survey, and all procedures and measures were approved by the Institutional Review Board at the research- er’s university.
Measures
A questionnaire was developed by the au- thors for this study. In developing the items for the questionnaire, our goal was to capture a broad range of behaviors that (a) represented familiar forms of bullying for this age group and (b) could be delivered through either “conven- tional” or “cyber” means. A group of under- graduate students in the second author’s psy- chology lab reviewed a pilot version of the questionnaire, and changes in wording were made in response to their suggestions. The final scale contained eight pairs of items, each de- scribing an incident in which the participant was bullied. Eight items described an incident of conventional bullying, and eight described par-
30 BAUMAN AND NEWMAN
allel scenarios in which the same bullying be- havior was inflicted via communications tech- nology. The order of items was randomized in the online survey, so that the pairs of items did not appear together on the scale. The seven response options ranged from 1 (not at all up- set) to 7 (extremely upset), with only the end points labeled. (See the Appendix for the full text of the eight pairs of items.)
Historical victimization experiences were as- sessed by asking participants whether they were bullied during junior high, high school, and college, by choosing from: never; occasionally; or frequently at each time period. This measure has been used in previous studies and is reliable up to 6 weeks later (r � .81; Hamilton, New- man, Delville, & Delville, 2008). Approxi- mately 57% of the current sample reported never being victimized, whereas almost 3% in- dicated that were victimized at least occasion- ally at all three levels. Only one participant indicated that he or she had been victimized only at college, whereas 16% were victimized at both junior high and high school, 19% were victimized only in junior high, and 5% only in high school. There were no gender differences in these victimization histories; the results of a chi-squared analysis were not significant.
Analysis
Predictive Analysis Software (2010; PASW 19.0) was used for all analyses. Missing data were MCAR (missing completely at ran- dom) (Little’s MCAR test: �2 � 626.44, df � 598, p � .21). However, because the rate of missingness was less than 1% for all variables and the sample was relatively large, we did not impute missing values, but used listwise dele- tion for all analyses.
Results
Preliminary Analyses
If cyberbullying represents a consistently more harmful form of bullying, we would expect two factors to emerge on the scale: one capturing conventional victimization and the other capturing cyber-victimization. Be- cause we had this a priori theoretical basis for the factors, we conducted a Confirmatory Factor Analysis to test the fit of the data to
this model. The fit statistics were uniformly poor (e.g., normed fit index and non-normed fit index .59 and .52, respectively), indicating that this particular two-factor model was not a good fit to the data.
We then conducted a principal components analysis with 16 items of the questionnaire to explore the underlying structure. Given the poor fit of the Confirmatory Factor Analysis model, we used an oblique rotation for the analyses, allowing the components to correlate with one another. The Kaiser-Meyer-Olkin Measure of Sampling Adequacy was .86, considered “mer- itorious” (Kaiser, 1970), and the Bartlett’s Test of Sphericity was significant, indicating the data were suitable for this analysis. The scree test suggested a three- or four-component solution, Parallel Analysis (O’Connor, 2000) suggested a three-component solution, and Velicer’s Mini- mum Average Partial test indicated that the smallest number of factors present in the data was one. We considered these findings, along with interpretability of the structure and deter- mined that the three-component structure was most useful. The rotated component matrix (Di- rect Oblimin rotation with Kaiser normaliza- tion) is shown in Table 1. The total variance explained by the three components was 65%.
After an examination of the component load- ings, we named the Component 1 “General Vic- timization,” Component 2 “Explicit Visual,” and Component 3 “Name Calling.” We then created scale scores for each component by computing the mean score of scale items. Internal consistency coefficients for these variables were .90 for Gen- eral (10 items), .92 for Explicit Visual (two items), and .83 for Name Calling (four items). We used mean scores for each scale so that the scores on the scales would be comparable. The overall mean was 4.61 (SD � 1.51) for General Victimiza- tion, 6.17 (SD � 1.45) for Explicit Visual, and 3.37 (SD � 1.61) for Name Calling. A one- way repeated measures ANOVA was conducted to compare the distress scores on the three scales. There was a significant effect by scales, Wilks’ � � .28, F(2, 559) � 707.35, p � .0005, multi- variate partial eta squared � .72. Pairwise com- parisons indicated that each scale was signifi- cantly different from the other two. The most distressful was Explicit Visual, followed by Gen- eral Victimization, and lastly Name Calling.
31SPECIAL ISSUE: TESTING ASSUMPTIONS ABOUT CYBERBULLYING
Is Cyberbullying Worse?
To examine the perceived distress associ- ated with cyber- versus conventional bully- ing, we conducted paired t tests with each of the eight pairs of items, using a Bonferroni correction. The difference between the paired items was significant for all pairs except “Teacher’s Pet” and “Naked.” The mean score of the conventional item was signifi- cantly higher in three of the pairs (“cartoon,” “exclusion,” and “slut”), and the cyber ver- sion was higher in three pairs (“lice,” “video,” and “personal ad”). Table 2 presents these analyses. The effect sizes indicate that the
magnitude of these differences were in the “small” range.
Gender. We investigated gender differ- ences among participants’ distress scores on the subscales. The differences between males and females were significant on all subscales: Gen- eral, t � 5.42, df � 573, p � .0005, �2 � .05 (a small effect); Explicit Visual (t � 7.6, df � 171.35 [adjusted due to violation of Levene’s test for equality of variances], p � .0005, �2 � .09 (a moderate effect); and Name Calling, t � 5.88, df � 571, p � .0005, �2 � .06 (a small effect. For all scales, females had significantly higher distress scores than males. See Table 3 for means and standard deviations. We also
Table 1 Rotated Component Matrix for Two-Component Solution
Item Component 1
(General) Component 2
(Explicit visual) Component 3
(Name calling)
Lice (conventional) .82 .27 .49 Lice (cyber) .80 .31 .42 Video (conventional) .80 .21 .35 Cartoon (cyber) .79 .28 .48 Cartoon (conventional) .78 .36 .54 Video (cyber) .77 .23 .35 Personal ad (cyber) .69 .50 .19 Personal ad (conventional) .68 .52 .20 Unfriended online .68 .28 .38 Not invited (conventional) .59 .30 .32 Naked (conventional) .43 .89 .14 Naked b (cyber) .45 .87 .14 Teacher’s pet (conventional) .52 -.03 .86 Teacher’s pet (cyber) .52 .01 .86 Slut (cyber) .52 .54 .73 Slut (conventional) .49 .59 .69
Note. Bolded values show component on which item loads.
Table 2 Descriptive Data and Paired t Test Results for Individual Items
Items Conventional
mean (SD) Cyber
mean (SD) Paired t p �2
Cartoon 4.8 (1.89) 4.44 (1.94) 2.65 .008 .01 Lice 4.56 (1.98) 4.75 (1.91) �4.10 .0005� .03 Naked 6.14 (1.51) 6.19 (1.52) �1.26 .26 .003 Exclusion 4.97 (1.79) 4.80 (1.99) 2.37 .02 .01 Video 4.33 (1.97) 4.47 (1.91) �2.70 .007� .01 Teacher’s pet 2.65 (1.78) 2.70 (1.78) �1.28 .20 .002 Personal ad 4.85 (1.95) 5.0 (1.94) �3.77 .0001� .02 Slut 4.17 (2.145 3.98 (2.13) 3.57 .0005� .03
Note. N � 558. � Significant at a Bonferroni-adjusted criterion of p � .005.
32 BAUMAN AND NEWMAN
examined gender differences in ratings of the individual scenarios. In every case, females rated the scenarios as more upsetting. These differences were significant in all but three sce- narios: the conventional “video” scenario ( p � .064) and both forms of the “teacher’s pet” scenario ( p � .45).
Victimization history. First, we calcu- lated bivariate correlation coefficients among the total Victimization score (sum of responses to the three items) and mean scores on the three scales. We observed that Victimization was sig- nificantly, but weakly, correlated with only the General Victimization scale (r � .10, p � .01). All three scales, as expected, were significantly correlated with each other (see Table 4).
To examine this question further, we con- ducted t tests comparing the distress scores on the three scales by victimization history (yes or no). Those with a history of victimization (M � 4.88, SD � 1.28) reported significantly more distress on the General Victimization items (t � �3.26, df � 567.88, p � .001, �2 � .02) than participants who reported no such history (M � 4.50, SD � 1.52). This pattern also held for the Explicit Visual items: M (yes) � 6.33, SD � 1.30; M (no) � 6.04, SD � 1.56); t � �2.40, df � 576.05, p � .02, �2 � .01. However, victims and nonvictims did not differ in their ratings of the Name Calling items, p � .30.
Discussion
This study adds to the literature by directly addressing a key assumption among researchers in the field of cyberbullying. Using a question- naire created for this study, we found three forms of bullying based on ratings of perceived distress: general bullying, which leads to hu- miliation or embarrassment of the target; name calling; and bullying that uses explicitly sexual images. It is noteworthy that in every case, the pairs of items loaded on the same factor. That is, the cyber and conventional forms of individual incidents were seen as more similar than differ- ent.
This study is the first to directly address the differences in perceived distress among victims of conventional bullying and cyberbullying. The findings are important because (a) we found no overall differences in distress by form (con- ventional or cyber) of victimization, contrary to expert expectations and (b) principal compo- nents analysis identified a three-component structure that was based not on form of victim- ization, but on the nature of the incident. Sec- ond, when comparing the parallel items, we discovered that although cyber-actions and con- ventional actions were significantly different for most pairs, the form that was more upsetting varied with items, providing further evidence that the form is not the distinguishing feature.
Table 3 t Tests for Gender Differences on the Two Components
Subscale
Male
n
Female
n t df p �2M SD M SD
General 4.03 1.46 138 4.80 1.47 437 5.42 573 .0005 .05 Explicit image 5.20 1.87 139 6.47 1.14 442 7.61 171.35 .0005 .10 Name calling 2.69 1.41 138 3.59 1.61 435 5.88 571 .0005 .06
Note. df � degrees of freedom.
Table 4 Correlations Among Subscales
General victimization Explicit visual Name calling
General victimization 1 .471�� .648��
Explicit visual 1 .341��
Name calling 1
�� p � 0.01.
33SPECIAL ISSUE: TESTING ASSUMPTIONS ABOUT CYBERBULLYING
Finally, we found significant gender differences on all subscales, with females reporting more distress than males.
Because the three scales were strongly corre- lated (see Table 4), it is not surprising that there were secondary loadings on some scales. The personal ad (both cyber and traditional) items were strongest on the general victimization component, which might reflect the perception that this action was a kind of prank. The sec- ondary loading is on the Explicit Visual scale, which has a sexual connotation. This is consis- tent with the nature of the advertisement in the vignette. The other set of items (calling some- one a “slut” in person or online) also had a secondary loading on the Explicit Visual, which is consistent with the sexual connotation of that term. The primary loading was on the Name Calling factor. In both cases, it could be that the feature of these items that is more salient to most respondents reflected the primary loading, but the strong relationship to other scales re- flects the other aspect of the item.
Research Implications
Taken together, these findings have several implications. First, it appears that the emotional distress caused by victimization is a function of the nature of the specific incident, rather than the method of its delivery. This demonstrates that expert opinions and theories need to be tested empirically; what seems logical based on extant work may not find support in data. Sec- ond, considerable research has focused on the types of conventional bullying (physical, ver- bal, relational) and the differences in distress and psychological outcomes for victims of the different types. Echoing the findings of Varjas, Henrich, and Meyers (2009), who concluded that the distinctiveness of the types of bullying is questionable, our findings suggest that it may not be the type of bullying, per se, that explains the differences in emotional responses, but rather the context of the particular incident and the victim’s gender. Although Eslea (2010) noted that several studies reported that indirect or relational bullying is more strongly related to such psychosocial outcomes as depression, he observed that more recent work has found that type of bullying was not a factor in perceived severity.
Eslea’s (2010) study is of particular relevance here because it involved participants at both the university level and at the secondary level (where students were ages 11–15). He investi- gated the levels of distress from bullying (or imagined bullying) by conventional means. He reported that adult females found their victim- ization to be more distressing than males, but no gender difference was detected in the secondary school sample. Eslea also found that those who had not actually experienced being physically bullied found the imagined situations to be more distressing than those who had, but this pattern was reversed for indirect bullying (so- cial exclusion and rumor spreading)—those who had personal experience being indirectly bullied reported greater distress than those who had not. In the present study, participants with a history of being victimized rated most of the scenarios as more distressing than nonvictims. Note that most of the items in our scale would be characterized as indirect bullying, so our results are similar to those of Eslea. One possi- ble explanation for these findings is that a his- tory of victimization leads people to interpret all bullying behaviors as more hostile and therefore more harmful (cf. (e.g., Camodeca, Goossens, Meerum Terwogt, & Schuengel, 2002; Salmivalli & Nieminen, 2002).
In the present study, the items on the “Gen- eral” victimization scale range from ambiguous items with the potential to be seen as playful to deliberate actions to hurt or humiliate the vic- tim. The fact that these items cluster on a single factor suggests that victims perceive compara- ble amounts of distress, regardless of whether the intent of the bully is direct harm or more subtle humiliation.
The items perceived as most distressing of all, regardless of method, was the sharing of naked pictures (Explicit Visual) that the partic- ipant had provided to a romantic partner, who then sent them to others than the intended re- cipient. When we consider the elements of this type of victimization, there appear to be two prominent features: betrayal of trust (the victim- ized person was assured by someone with whom he or she was in a romantic relationship that the photo was for their personal use only) and humiliation (not only was the photo pub- licly viewed, but the fact that the victim had taken such a self-portrait is also public). It may be the case that such characteristics magnify the
34 BAUMAN AND NEWMAN
severity and therefore the distress. Smith et al. (2008) reported that adolescents in their study considered bullying that used images to have the most negative impact on the target. In addi- tion, it is important to note that this practice of sending nude or seminude photos of oneself via picture messaging, known as “sexting,” is not uncommon. A January 2009 national report re- vealed that 20% of teens and young adults said they engaged in sexting, and 11% of females ages 13–16 said they had done so (National Campaign to Prevent Teen and Unplanned Pregnancy, 2009).
Limitations
One potential limitation of the present study is that the sample was composed of college students, and some of the scenarios might be more common in middle or high school settings. However, be- cause all the students in the sample had been middle and high school students in the not-too- distant past and because bullying (including cy- berbullying) occurs in college, we believe the sample provided useful information on this impor- tant subject. Other researchers (e.g., Englander, 2011) asked college students about their high school experiences with bullying and cyberbully- ing. In addition, not inquiring about personal ex- periences, but hypothetical ones, in the question- naire also may prevent social desirability from influencing responses. Finally, it is worth noting that the scenarios used in this study represent single incidents of bullying. Bullying typically involves repeated harm done by more powerful peers. Thus, future research should examine rat- ings of perceived distress following more sus- tained acts of cyberbullying and conventional bul- lying. Future research should attempt to refine the questionnaire, as noted above, and to study this question in middle and high school students to see whether findings are similar to those in this study.
Our measure of previous victimization experi- ences showed weak association with participants’ ratings of perceived distress. However, it is worth noting that the victimization measure assessed global perceptions of having been bullied, rather than the specific form of bullying (cyber vs. con- ventional). Thus, another important question for future research is the relationship between specific past experiences and responses to specific acts of bullying. Is it more distressing to encounter the same type of victimization or to encounter a novel
form? Does a history of cyber or conventional victimization have differential effects on percep- tions of specific acts? Future studies could address these questions with a more fine-grained measure of victimization history. We suspect, however, that the cumulative impact of bullying on psycho- logical symptoms depends more on the frequency of its occurrence than on the method of its delivery.
Clinical and Policy Implications
To summarize, we demonstrated that cyber- bullying may not be uniformly more harmful than other types of bullying. This suggests that strategies to assist victims may be implemented with regard to the context and severity of the bullying, rather than its method of delivery. Interestingly, Salmivalli, Kärnä, and Poskiparta (2011) assessed the effects of a bullying inter- vention program that did not include cyberbul- lying and found that cyberbullying also de- creased after the intervention. This suggests that existing effective antibullying programs could be effective in reducing cyberbullying as well. We also found that bullying with sexual mate- rial, whether conventionally or by technological methods, is the most upsetting kind of incident to targets. Technology makes it easier to perpe- trate this kind of behavior, which may explain the perception that technology is the problem. Given that these incidents of sexual victimiza- tion have different connotations for men and women, prevention efforts may need to be structured in gender-specific ways for maxi- mum benefit. Prevention and intervention pro- grams should also make it clear that the harm inflicted with such actions is serious and can severely damage someone’s reputation. In our society, in which sexualized images and themes are ubiquitous, that is a difficult message to convey.
References
Anonymous. (2006, November 27). Star wars kid is top video. BBC News. Retrieved from http:// news.bbc.co.uk/2/hi/entertainment/6187554.stm
Baldry, A. C. (2004). The impact of direct and indi- rect bullying on the mental and physical health of Italian youngsters. Aggressive Behavior, 30, 343– 355. doi:10.1002/ab.20043
Barter, C., & Renhold, E. (2000). “I wanna tell you a story’: Exploring the application of vignettes in
35SPECIAL ISSUE: TESTING ASSUMPTIONS ABOUT CYBERBULLYING
qualitative research with children and young peo- ple. International Journal of Social Research Methodology, 3, 307–323. doi:10.1080/ 13645570050178594
Bauman, S. (2010). Cyberbullying in a rural interme- diate school: An exploratory study. Journal of Early Adolescence, 30, 803– 833. doi:10.1177/ 0272431609350927
Bauman, S., & Del Rio, A. (2006). Pre-service teach- ers’ response to bullying scenarios: Comparing physical, verbal, and relational bullying. Journal of Educational Psychology, 98, 219 –231. doi: 10.1037/0022-0663.98.1.219
Bauman, S., & Summers, J. (2009). Victimization and depression in Mexican American middle school students: Including acculturation as a vari- able of interest. Hispanic Journal for the Behav- ioral Sciences, 31, 515–535. doi:10/1177/ 0739986309346694
Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Stu- dent Wellbeing, 1, 15–33.
Brody, L. R. (1984). Sex and age variations in the quality and intensity of children’s emotional attri- butions to hypothetical situations. Sex Roles, 11, 51–59. doi:10.1007/BF00287440
Camodeca, M., Goossens, F. A., Meerum Terwogt, M., & Schuengel, C. (2002). Bullying and victim- ization among school-age children: Stability and links to proactive and reactive aggression. Social Development, 11, 332–345. doi:10.1111/1467- 9507.00203
Campbell, M. (2005). Cyber-bullying: An old prob- lem in a new guise? Australian Journal of Guid- ance and Counseling, 15, 68 –76. doi:10.1375/ ajgc.15.1.68
Card, N. A., Stucky, B. D., Sawalani, G. M., & Little, T. D. (2008). Direct and indirect aggression during childhood and adolescence: A meta-analytic review of gender differences, intercorrelations, and relations to maladjustment. Child Development, 1185–1229. doi:10.1111/j.1467-8624.2008.01184.x
Cassidy, W., Jackson, M., & Brown, K. N. (2009). Sticks and stones can break my bones, but how can pixels hurt me?: Students’ experiences with cyber- bullying. School Psychology International, 30, 383– 402. doi:10.1177/0143034309106948
Craig, W. M., Henderson, K., & Murphy, J. G. (2000). Prospective teachers’ attitudes toward bullying and victimization. School Psychology International, 21, 5–21. doi:10.1177/0143034300211001
Crick, N. R. (1995). Relational aggression: The role of intent attributions, feelings of distress, and provoca- tion type. Development and Psychopathology, 7, 313–322. doi:10.1017/S0954579400006520
Crick, N. R., & Dodge, K. A. (1994). A review and reformulation of social information-processing mechanisms in children’s social adjustment. Psy-
chological Bulletin, 115, 74 –101. doi:10.1037/ 0033-2909.115.1.74
Dempsey, A. G., Sulkowski, M. L., & Nichols, R. (2009). Differences between peer victimization in cyber and physical settings and associated psycho- social adjustment in early adolescence. Psychology in the Schools, 46, 962–972. doi:10.1002/ pits.20437
Englander, E. K. (2007). Understanding violence. Mahwah, NJ: Erlbaum.
Englander, E. K. (2011). MARC Freshman Study 2011: Bullying, cyberbullying, risk factors, and reporting. Retrieved from http://webhost.bridgew.edu/marc/ MARC%20Freshman%20Study%202011.pdf
Eslea, M. (2010). Direct and indirect bullying: Which is more distressing? In K. Österman (Ed.), Indirect and direct aggression (pp. 69 – 84). Frankfurt am Main, Germany: Peter Lang.
Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Vio- lence 19, 468 – 483.
Flaskerud, J. H. (1979). Use of vignettes to elicit responses toward broad concepts. Nursing Re- search, 28, 210 –212. doi:10.1097/00006199- 197907000-00004
Griezel, L., Craven, R. G., Yeung, A. S., & Finger, L. R. (2008, December). The development of a multi-dimensional measure of cyberbullying. Pa- per presented at the Australian Association for Research in Education conference, Brisbane, Australia.
Hamilton, L. D., Newman, M. L., Delville, C., & Delville, Y. (2008). Physiological stress response of young adults exposed to bullying during ado- lescence. Physiology & Behavior, 95, 617– 624. doi:10.1016/j.physbeh.2008.09.001
Hawker, D. S. J., & Boulton, M. J. (2000). Twenty years’ research on peer victimization and psycho- logical maladjustment: A meta-analytic review of cross-sectional studies. Journal of Child Psychol- ogy and Psychiatry, 41, 441– 455. doi:10.1111/ 1469-7610.00629
Hinduja, S., & Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cy- berbullying. Thousand Oaks, CA: Corwin Press.
Kaiser, H. F. (1970). A second generation little jiffy. Psychometrika, 35, 401– 415. doi:10.1007/ BF02291817
Kowalski, R., Limber, S. P., & Agatston, P. W. (2008). Cyberbullying. Malden, MA: Blackwell.
MacDonald, C., & Roberts-Pittman, B. (2010). Cy- berbullying among college students: Prevalence and demographic differences. Procedia: Social and Behavioral Sciences, 9, 2003–2009.
Marsh, D. T. (1982). The development of interper- sonal problem solving among elementary school children. Journal of Genetic Psychology, 140, 107–118.
36 BAUMAN AND NEWMAN
Mize, J., & Ladd, G. W. (1988). Predicting pre- schoolers’ per behavior and status from their in- terpersonal strategies: A comparison of verbal and enactive responses to hypothethical social dilem- mas. Developmental Psychology, 24, 782–788. doi:10.1037/0012-1649.24.6.782
National Campaign to Prevent Teen and Unplanned Pregnancy. (2009). Sex and tech: Results from a survey of teens and young adults. Retrieved from http://www.thenationalcampaign.org/sextech/ PDF/SexTech_Summary.pdf
Nelson, D. A., & Crick, N. R. (1999). Rose-colored glasses: Examining the social information process- ing of prosocial young adolescents. Journal of Early Adolescence, 19, 17–38. doi:10.1177/ 0272431699019001002
O’Connor, B. P. (2000). SPSS and SAS program for determining the number of components using par- allel analysis and Velicer’s MAP test. Behavior Research Methods, Instruments, & Computers, 3, 396 – 402.
Parada, R. (2000). Adolescent Peer Relations In- strument: A theoretical and empirical basis for the measurement of participant roles in bullying and victimisation of adolescence: An interim test manual and a research monograph: A test manual. Publication Unit, Self-concept En- hancement and Learning Facilitation (SELF) Research Centre, University of Western Sydney, Australia.
Prinstein, M. J., Boergers, J., & Vernberg, E. M. (2001). Overt and relational aggression in adoles- cents: Social psychological adjustment of aggres- sors and victims. Journal of Clinical Child & Ad- olescent Psychology, 30, 479 – 491. doi:10.1207/ S15374424JCCP3004_05
Salmivalli, C., Kärnä, A., & Poskiparta, E. (2011). Counteracting bullying in Finland: The KiVa pro- gram and its effects on different forms of being bullied. International Journal of Behavioral De- velopment, 25, 405– 411. doi: 10.1177/ 0165025411407457
Salmivalli, C., & Nieminen, E. (2002). Proactive and reactive aggression among school bullies, victims, and bully-victims. Aggressive Behavior, 28, 30 – 44. doi:10.1002/ab.90004
Schoenberg, N. E., & Ravdal, H. (2000). Using vi- gnettes in awareness and attitudinal research. Jour- nal of Social Research Methodology, 3, 63–74. doi:10.1080/136455700294932
Selwyn, N. (2008). Developing the technological imagination: theorising the social shaping and con- sequences of new technologies. In S. Livingstone (Ed.), Theorising the benefits of new technology for youth: Controversies of learning and develop- ment (pp. 18 –29). Department of Education, Uni- versity of Oxford, Oxford, UK.
Sharp, S. (1995). How much does bullying hurt? The effects of bullying on the personal wellbeing and educational progress of secondary aged students. Educational and Child Psychology, 12, 81– 88.
Slaby, R. G., & Guerra, N. G. (1988). Cognitive mediators of aggression in adolescent offenders: 1. Assessment. Developmental Psychology, 24, 580 – 588. doi:10.1037/0012-1649.24.4.580
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154. doi:10.1111/ j.1467-9450.2007.00611.x
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: It’s nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376 –385. doi:10.1111/j.1469-7610.2007.01846.x
Star wars kid files lawsuit. (2003, July 24, ). Wired. Retrieved from http://www.wired.com/culture/ lifestyle/news/2003/07/59757
Suler, J. (2004). The online disinhibition effect. Cy- berPsychology & Behavior, 7, 321–326.
Tegeler, C. (2010, August 8). Text harassment, cyberbul- lying a concern even for college students. Retrieved from http://wcfcourier.com/news/local/article_ 4e33f555-24bf-5154-af4d-f0aa734d46f8.html
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Hu- man Behavior, 26, 277–287. doi:10.1016/ j.chb.2009.11.014
van der Wal, M. F., de Wit, C. A. M., & Hirasing, R. A. (2003). Psychosocial health among young victims and offenders of direct and indirect bully- ing. Pediatrics, 111, 1312–1317. doi:10.1542/ peds.111.6.1312
Varjas, K., Henrich, C. C., & Meyers, J. (2009). Urban middle school students’ perceptions of bul- lying, cyberbullying, and school safety. Journal of School Violence, 8, 159 –176. doi:10.1080/ 15388220802074165
Wang, J., Ianotti, R., & Nansel, T. R. (2009). School bullying among US adolescents: Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45, 368 –375. doi:10.1016/j.jadohealth .2009.03.021
Willard, N. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social ag- gression, threats, and distress. Champaign, IL: Research Press.
Woods, S., & Wolke, D. (2003). Does the content of anti-bullying policies inform us about the preva- lence of direct and relational bullying behavior in primary schools? Educational Psychology, 23, 382– 401. doi:10.1080/0144341032000096265
wvu today. Researchers look at cyberbullying victim- ization among college students.(2011, March 30). Retrieved from http://wvutoday.wvu.edu/n/2011/
37SPECIAL ISSUE: TESTING ASSUMPTIONS ABOUT CYBERBULLYING
3/30/wvu-researchers-look-at-cyber-bullying- victimization-among-college-students
Ybarra, M. L., & Mitchell, K. J. (2004). Youth en- gaging in online harassment: Associations with caregiver-child relationships, Internet use, and per-
sonal characteristics. Journal of Adolescence, 27, 319 –336. doi:10.1016/j.adolescence.2004.03.007
Yoon, J. S., & Kerber, K. (2003). Bullying: Elemen- tary teachers’ attitudes and intervention strategies. Research in Education, 69, 27–34.
Appendix
Bullying Scenarios
Bullying Incidents
Harm Conventional version Cyber version
Cartoon You discover a cartoon making fun of you on the bulletin board in one of your classrooms.
You find a website that has a cartoon making fun of you on it.
Lice You were absent from school because you were sick. Someone started a rumor that you missed school because the nurse sent you home for having lice in your hair. When you come into the classroom, everyone starts scratching their heads and saying “Eewww, I got lice from you.”
Someone sends a text or e-mail to everyone that says you were absent from school because you were sent home by the nurse for having lice in your hair, and says that they got lice from you.
Naked Photo You sent your boyfriend or girlfriend a picture of you naked that they promised would be private. He/she showed it to a bunch of friends.
You sent your boyfriend or girlfriend a picture of you naked that they promised would be private. Then he/ she sent it to a bunch of friends.
Exclusion You find out that one of your friends is having a party this weekend and did not invite you.
You find out that several of your friends unfriended you on MySpace or Facebook.
Video You make a video of yourself in a silly costume, just for laughs, and you don’t expect anyone to see it. You realize it is missing after one of your friends visits you. You are pretty sure he/she will show it to some other friends.
You make a video of yourself in a silly costume, just for laughs, and you don’t expect anyone to see it. You realize it is missing after one of your friends visits you. You are pretty sure he/she will put it on YouTube.
Teacher’s Pet Someone writes “teacher’s pet” in your yearbook.
Someone puts a comment on your MySpace or Facebook page that says “Teacher’s pet.”
Personal Ad Someone puts an ad in the newspaper saying you are looking for love and giving your phone number. You start to get calls.
Someone put a personal ad on Craigslist saying you are looking for love and giving your phone number. You start to get calls.
Slut Being called a “slut” in front of a group of your friends.
Getting an e-mail or text message calling you a “slut.”
Received February 7, 2012 Revision received July 23, 2012
Accepted July 25, 2012 �
38 BAUMAN AND NEWMAN
Cyberbullying among Adolescent Bystanders: Role of the Communication Medium, Form of Violence, and Empathy
JULIA BARLIŃSKA1*, ANNA SZUSTER1 and MIKOŁAJ WINIEWSKI2 1University of Warsaw, Faculty of Psychology, Warsaw, Poland 2The Maria Grzegorzewska Academy of Special Education, Warsaw, Poland
ABSTRACT
The purpose of this study was to understand how adolescents respond as bystanders of cyberbullying and to seek factors that might influence their actions. The study explored the effects of type of contact (online vs. face to face), form of violence (private vs. public), and empathy activation (affective and cognitive) on negative bystander behaviour understood as active participation in victimisation. The influence of experience of cyberbullying as perpetrator and as victim and gender on negative bystander behaviour was also controlled. Three experimental studies were conducted. The results indicate that online contact increases the likelihood of negative bystander behaviour. Private violence was less likely to elicit negative bystander action than was public violence. Previous experience of cyberperpetration was proved to increase the probability of negative bystander behaviour. Neither gender nor cybervictimisation affected the engagement in negative bystander behaviour in any of the studies. The inhibitory effect of empathy activation (both affective and cognitive) on negative bystander behaviour was demonstrated. Both types of cognitive empathy induction, emotion and behaviour focused, diminish the likelihood of negative bystander behaviour. The conclusions of the research are that negative bystander behaviour occurs more often in cyberspace than offline and that forms of intervention involving both affective and cognitive empathy may limit the negative bystander behaviour that supports cyberbullying. Copyright © 2012 John Wiley & Sons, Ltd.
Key words: cyberbullying; bystanders; adolescents; empathy
INTRODUCTION
For adolescents, the Internet is a natural environment for gaining experience and satisfying social needs. Cyberbullying is a novel social phenomenon whose consequences and scale
*Correspondence to: Julia Barlińska, Wydział Psychologii Uniwersytetu Warszawskiego, ul. Stawki 5/7, 00-183 Warszawa, Poland. E-mail: [email protected]
Journal of Community & Applied Social Psychology J. Community Appl. Soc. Psychol., 23: 37–51 (2013) Published online in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/casp.2137
Copyright © 2012 John Wiley & Sons, Ltd. Accepted 31 October 2012
(Barlinska & Wojtasik, 2008; Hinduja & Patchin, 2008; Li, 2006; Walrave & Heirman, 2011) necessitate the development of empirically validated guidelines for intervention and prevention.
Research has clearly demonstrated that bystanders play a significant role in bullying, being regarded as the ‘invisible engine in the cycle of bullying’ (Twemlow, Fonagy, Sacco, Gies, & Hess, 2001). The emphasis on the importance of bystanders as powerful moderators of behaviour is increasing (Salmivalli, 1999) also in the context of cyberbullying (Ball, 2007; Kraft, 2011).
In this project, we focus on the negative aspects of the activities of witnesses. In this context, a bystander audience in cyberspace can play an active role by participating in the victimisation. Although they may not have created a text or image, individuals are complicit in spreading it to ever-widening audiences. The decision to forward a nasty message makes the boundary between perpetrator and negative bystander a very fine one (Spears, Slee, Owens, & Johnson, 2008).
Although, as in traditional bullying, the best way to react as a bystander might be by actively disapproving the acts of the bully and defending the victim, in cyberspace, inactive behaviour has a different connotation than it does in direct contact and is positive to some degree. Being a bystander inactive in the process of harming by choosing not to post or forward but to delete nasty materials seems to be an important part of the solution to the problem of cyberbullying, as this prevents the audience for cyberbullying from being enlarged. This kind of reaction over the Internet towards someone being bullied entails some degree of moral engagement in not being part of the problem (Spears et al., 2008).
Cyberbullying: online peer bullying
In the context of adolescents, bullying is defined as the intentional, negative actions of one or more pupils over an extended period, involving repeated, direct attacks on another student who, due to the perpetrator’s advantage (whether physical or psychological), is unable to defend himself or herself (Olweus, 1993). By extension, cyberbullying should possess all those features, but the main difference is that it is committed via the medium of modern communication technologies (Williams & Guerra, 2007). Due to the specifics of the utilisation of these technologies, a number of characteristic features of bullying, for example, repeated attacks, become ambiguous in cyberspace (Boyd, 2007). This complicates the task of finding a precise definition.
For the purpose of this project, we treat cyberbullying in general terms as violence committed by perpetrators and bystanders using information and communication technol- ogies and various functionalities of the Internet, especially messaging software and social networking services.
Also, the context of roles necessitates refining the basic definition of bullying, from a dyadic (bully–victim) to a triadic (bully–victim–bystander) perspective (Twemlow et al., 2001). From this point of view, cyberbullying committed via instant messengers and social networking services can be regarded as a group phenomenon in which young Internet users are either intentionally or unintentionally involved in bullying as active or inactive bystanders (Ball, 2007).
Cyberbullying can assume a number of forms, for example, online harassment, intimi- dation, and blackmail. Still, the most common form in the population of Polish teenagers is verbal bullying and the publication or dissemination of derisory and defamatory images
38 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
or videos. Interestingly, in over a half of all bullying cases, Polish adolescents are humil- iated by strangers. Unfamiliar peers appear to be especially active as perpetrators or negative bystanders (Barlinska & Wojtasik, 2008).
The characteristics of online interaction and bystander behaviour
Bystanders in cyberbullying can easily engage in perpetration (Kowalski, 2008), for example, by forwarding or posting an image designed to humiliate another child. At the same time, bystanders often do not perceive themselves as actual participants, although they undertake actions that contribute to the harassment (Kraft, 2011). The characteristics of computer- mediated communication are partly responsible for making teenagers particularly susceptible to taking part in bystander behaviour that supports cyberbullying. The key factor in this is the perceived online anonymity (McKenna & Bargh, 2000)
of the actor and the potential partner of the interaction – both victim and bystander. It facilitates deindividuation and the diminution of a sense of responsibility (McKenna, 2008). This leads to Internet disinhibition (Joinson, 1998), which consists of the loss of self-control and the absence of restraints in social behaviour typical of direct interaction (Suler, 2004). Although interaction in cyberspace is becoming more and more visual, non-verbal
communication is still limited when compared with face-to-face contact. Online interaction lacks access to a whole host of information, such as that provided by facial expressions, eye contact, or physical distance, which could modify the behaviour (Suler, 2004) through the automatic activation of empathy as an inhibitor of aggression (Hoffman, 2000) in cyberspace (Smith et al., 2008; Steffgen & König, 2009). Limited feedback regarding the impact of online activity on other users produces the ‘cockpit effect’ (Heirman & Walrave, 2008), wherein bystanders are often unaware of the actual harm caused to the victim (Kraft, 2011). It creates distinctive conditions that encourage unwitting aggression, which supports
cyberbullying by negative bystander behaviour.
Public versus private forms of cyberbullying
The size of the audience bearing witness to an act of bullying may influence the chances of negative bystander behaviour occurring. It is also the defining criterion that differentiates private from public forms of violence. This is equally true of traditional bullying and cyberbullying. Yet in cyberbullying, this distinction seems more important than in face- to-face forms of bullying. Cyberbullying referred to as a ‘cowardly form of bullying’ (Belsey, 2008) creates circumstances, in which private communication seems to have the potential to exacerbate behaviour that supports bullying (Ball, 2007). Negative bystander behaviour is more readily performed by means of private forms of
violence as private communication may allow a more selective and purposeful choice of recipients – those who share and approve of such standards of behaviour. It increases the probability of escaping unpunished and involves a negligible risk of adult intervention. Because social norms, including those norms that prohibit causing harm to others and actualise the potential penalty for their transgression, are more readily activated in a public setting (Wicklund, 1975), we expected that negative bystander behaviour might occur more frequently in private forms of violence.
Cyberbullying among adolescent bystanders 39
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Empathy as inhibitor of cyberbullying
Apart from minor definitional differences, there is a general consensus that empathy is determined by circumstances and the condition of the other person as experienced by the subject. Empathy can be described as an ‘affective response more appropriate to someone else’s situation than to one’s own’ (Hoffman, 1982, p.281) or as the ability to recognise, understand, and share the emotions and sensations of others (Singer & de Vignemont, 2006). The exploration of cyberbullying among adolescents focuses on the developmental aspect of empathy (Hoffman, 2000). It is considered to be a continuum, with affective and cognitive empathy at its two extremes.
Affective empathy (Eisenberg, 2000; Hoffman, 2000) is a basic process, analogous to the affective content of incoming stimuli. It is manifested in the ability to effortlessly sense and powerfully experience the emotions of others. This ability to respond to the states of other people is believed to be innate or to emerge early in ontogenesis. Empathy is triggered by direct contact with another person. No particular activity is required; merely noticing a situation suffices. This kind of empathy is based on superficial cues and requires the mediation of basic cognitive processes.
Cognitive empathy is the ability to understand the beliefs, feelings, and intentions of others (Decety & Jackson, 2004). It underlies the ability to abstract from a specific or directly available situation. Moreover, cognitive empathy controls the ability to anticipate the consequences of one’s actions on others, including violent acts. Cognitive empathy is free from a number of the limitations of affective empathy occurrence, such as the necessity of direct contact with another person and sharing their emotional state. Activa- tion of more advanced modes of empathic stimulation, such as change of perspective, triggers qualitatively different responses. These processes may be extended in time and be subject to volitional control, thereby significantly expanding the scope of empathy beyond direct interaction (Hoffman, 2000).
Research has demonstrated the importance of cognitive empathy. It is typically operatio- nalised as perspective taking or role taking in shaping positive social relationships (Batson, 1991; Eisenberg et al., 1993), as well as reducing negative behaviour such as prejudice (Galinsky, Ku, & Wang, 2005) and enhancing tolerance of stigmatised groups (Batson et al., 1997). Active teaching of perspective taking has become an effective component of prevention and therapy programmes (Chalmers & Townsend, 1990; Robinson & Maines, 1997), amending cognitive empathy deficits in, among others, young offenders engaging in violence and bullying their peers at school.
In the context of cyberbullying, the role of empathy in mitigating negative bystander behaviour is of particular importance. The cognitive and affective components of empathy have been shown to reduce aggressive behaviour (Jolliffe & Farrington, 2004) and the propensity for committing offences and engaging in peer violence (Davis, 1994). Cyberbullies have also been found to have lower cognitive dispositional empathy towards their potential victims (Steffgen & König, 2009). Increasingly, neuroscientists, psycholo- gists, and educators believe that antisocial behaviour can be reduced by encouraging empathy at an early age.
Research into the effects of empathy on cyberbullying has yet to address the third- party role played by bystanders. The studies referenced above support the view that empathy is a potentially important inhibitor of bystander behaviour that sup- ports bullying.
40 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Significance of victimisation and perpetration cyberbullying experience
Similar to real life, online aggression affects the way people act towards others (Ybarra & Mitchell, 2004). Research findings have confirmed that there is an interaction between the experience of being a perpetrator of cyberbullying and that of being its victim (Walrave & Heirman, 2011; Ybarra & Mitchell, 2004). This also applies to a lesser extent to traditional bullying. In addition, the two kinds of bullying – online and face to face – are related (Slonje & Smith, 2007; Smith et al., 2008). This is because past involvement in the perpe- tration of violence reinforces aggressive behaviour through operant conditioning and mod- elling (Bandura, 1973). Bystanders’ exposure to cyberbullying is another source of new forms of aggression,
increasing the probability of enacting forms of bullying (Parke & Slaby, 1983). This can make bystanders support cyberbullying more easily (Kowalski, 2008) as it raises their overall tolerance to violence. The experience of victimisation is another factor that facilitates bullying. The sense of
isolation and helplessness experienced by victims of cyberbullying may prompt them to support bullying more easily, by exacting a kind of revenge on their persecutor or on another person or social group. These dependencies allow us to expect the existence of relationships between the
experience of being a perpetrator or victim of cyberbullying and the characteristics of bystanders’ behaviour.
Gender
Gender is a factor that may differentiate the severity of bullying both in face-to-face and online interactions. Yet the existing data on cyberbullying are inconclusive. Some suggest that cyberbullying perpetration is more prevalent among boys (Dehue, Bolman, & Vollink, 2008; Li, 2006) and that girls are more often victims (Smith et al., 2008). Others have found no gender differences (Hinduja & Patchin, 2008; Slonje & Smith, 2007; Williams & Guerra, 2007; Ybarra & Mitchell, 2004). When it comes specifically to bystanders, the data show that there are no gender
differences in peer interventions either in traditional bullying (Ball, 2007) or in cyberbullying cases (Li, 2006). In the present study, gender differences are examined in relation to negative bystander behaviour in supporting cyberbullying.
Overview of research
We present three experimental studies conducted on a randomised sample of pupils aged 11–18 years. The aim of the studies was to identify the factors that facilitate and inhibit negative bystander behaviour in supporting cyberbullying. The effect of gender and being the victim and/or perpetrator of cyberbullying was controlled.
STUDY 1
The purpose of the first study was to compare the likelihood of negative bystander behaviour in two types of interactions: online and face to face. The characteristics of contact in cyberspace may encourage impulsive behaviour and may increase the propensity for
Cyberbullying among adolescent bystanders 41
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
bystander behaviour supporting cyberbullying. Therefore, we decided to test in a controlled setting whether online interaction is associated with a higher likelihood of negative bystander behaviour than face to face contact. In addition, the public versus private dimension effect was explored. As the selective and purposeful choice of addressees creates a group of recipi- ents who share and approve of such standards of behaviour (Willard, 2006), we expected that the chance of negative bystander behaviour would be greater in private forms of violence.
Participants
The sample consisted of 760 pupils (380 boys and 380 girls) aged 11–18 years (Mage = 14.91 years; SDage = 1.04 years) from junior high schools and high schools from three provinces of Poland.
Manipulation
Each participant received a ‘Message from a peer’; its main element was in the form of a picture containing a debasing image manipulated to show a boy’s face on the body of a dog with the following comment: ‘Hi, this is my classmate, he looks like a total fool’. The situation was inspired by actual cases reported to helpline.org.pl, which provides support to victims of Internet threats.
A Web application, simulating a popular online communication tool among teenagers, was used in the online condition. In the face-to-face condition, the message was provided on a sheet of paper to reproduce the actual social context of a typical classroom situation.
Participants were assigned to one of four conditions: face to face versus online and private versus public. The task was to make a decision on whether the cyberbullying material should be public or not. This decision was the indicator of active versus inactive bystander behaviour. The forms of active or passive behaviour varied depending on the condition:
• ‘pass the message to another student’ or ‘throw it away’ in private the face-to-face condition; • ‘forward to a peer’ or ‘delete’ in the private online condition; • ‘put it up in the school’s hall’ or ‘throw it away’ in the public face-to-face condition; • ‘add to class profile’ or ‘delete’ in the public online condition.
Procedure
The study was anonymous and carried out in groups. To control access to the online version of the study, each participant logged in using a unique, one-time password. The study was conducted as an in-class (computer laboratory) experiment following a 2 (online vs. face-to-face condition) � 2 (private vs. public conditions) between-participant design with random group assignment.
The opening task was ‘Message from a peer’. After reading the message, participants were asked to choose how to act; then, participants completed a questionnaire on the experience of cyberbullying.
Measures
A 10-item scale of cyberbullying experience (Barlinska & Wojtasik, 2008) was employed. The questionnaire consists of two subscales, each containing five questions, related to
42 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
experiencing incidents of cyberbullying as the perpetrator (e.g. ‘Have you ever posted or sent material that was false or embarrassed someone?’) and victim (e.g. ‘Has anyone ever posted false or embarrassing materials about you?’). Answers were indicated on a 4-point Likert-type scale (1 – never, 4 – several times). Both scales (Mvictim = 1.60, SD = 0.61, and Mperpetrator = 1.74, SD = 0.68) proved to be internally consistent, a = .81 and a = .74, respectively. The composite scores were used in further analyses.
Results
To evaluate whether gender, the type of contact (online vs. face-to-face), and form of violence (private vs. public) affected the likelihood of negative bystander behaviour, a logistic regression analysis was conducted, with selected behaviour (0 – inactive, 1 – active) as the dependent variable. To address the question of whether previous experiences of cyberbullying influenced negative bystander behaviour, a second model with an additional block was tested. In the first model, gender, type of contact, and form of violence were entered. In the second step, previous experiences as a victim and perpetrator of cyberbullying were included in the model. Table 1 presents the results of the hierarchical logistic regression analysis and includes
the values of individual regression coefficients and odds ratios with 95% confidence intervals, Wald’s chi-squared with the significance level for each variable, overall model fit statistics, and several measures of association. The overall model statistics suggest a good fit and the predictive abilities of the model. The
results of the first step indicate that negative bystander behaviour is more likely to occur in online than in face-to-face contact. Furthermore, the public context of violence decreases negative bystander behaviour regardless of the type of contact. In additional, the results show that gender is not related to the choice of behaviour. In the second step, past experiences of cyberbullying were entered. This model was superior to the previous one in terms of overall fit, showing the significant impact of these experiences. However, only experience as perpe- trator was significant and served as an independent predictor of negative bystander behaviour.
Table 1. Logistic regression for cyberbullying and gender, type of contact, form of violence, and experiences with cyberbullying
Predictor B SE B Wald’s w2 OR (95% CI) Block w2
Step 1 28.05** Gender (0 – girls) �0.03 0.16 0.05 0.97 (0.71–1.32) Contact (0 – face to face) 0.48 0.16 9.08* 1.62 (1.18–2.21) Form (0 – private) �0.65 0.16 16.43** 0.52 (0.38–0.71) Step 2 57.99** Experience as perpetrator 0.83 0.15 30.93** 2.29 (1.71–3.07) Experience as victim 0.12 0.17 0.50 1.13 (0.81–1.57)
Overall model w2
Likelihood ratio test 85.90** Score test 84.66** H&L 6.49
*p > .05; **p < .001. Step 1: Cox & Snell R2 = .04; Nagelkerke R2 = .05; McFadden R2 = .03. Step 2: Cox & Snell R2 = .11; Nagelkerke R2 = .15; McFadden R2 = .09.
Cyberbullying among adolescent bystanders 43
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
STUDY 2
Research on empathy in the context of cyberbullying has shown relatively low levels of empathic stimulation in the perpetrator during interaction with the victim (Steffgen & König, 2009). Activation of affective empathy preceding a potential cyberbullying act may reduce the probability of the act by inducing emphatic arousal through automatic, uncontrolled mechanisms. We decided to test whether affective empathy activation is associated with a lower likelihood of negative bystander behaviour.
Participants
The sample consisted of 296 pupils (189 boys and 107 girls) aged 12–18 years (Mage = 15.35 years, SDage = 1.24 years) from junior high schools and high schools.
Manipulation
To activate affective empathy, a 2-minute video recording was used presenting a case of cyberbullying, the victim’s feelings, and the effects on her behaviour.
A pilot test examined the effectiveness of the empathy manipulation. In a between- group experimental study, we tested whether watching the movie would change the emotional state of participants. We used a Polish adaptation of the positive and negative affect schedule (PANAS; Watson, Clark, & Tellegen, 1988). Forty-four junior high school pupils were split in two groups (21 in the movie and 23 in the no-movie condition). In the first condition, the participants watched the movie and then completed the 20-item PANAS scale. In the control condition, the participants only completed the scale.
To compare emotions across groups, an analysis of variance with mixed design was conducted, involving a 2 (condition) � 2 (positive and negative emotions) design, with the first factor varying between participants and the second factor within participants. A signifi- cant condition � emotions effect was found, F(1,42) = 23.67, p < .01; �p = 0.36. Post hoc analysis showed that in the control group, positive emotions were significantly higher (M = 3.22) than those in the group that had seen the movie (M = 2.05), and the difference was very large d = 1.64. The opposite pattern was found for negative emotions – these were higher in the movie condition (M = 1.83) than that in the control condition (M = 1.34). The difference here was smaller but still substantial (d = 0.68).
The pilot test showed that watching the manipulation movie changed the emotional state according to the signs of the emotions exposed: It strengthened the experience of negative emotions and decreased the experience of positive emotions. It is typical of the reaction of sympathy – a symptom of empathy.
Procedure
The study followed a between-participant design. The place of the study and procedure were similar to Study 1. First, pupils were randomly assigned to experimental (empathy activation) or control (no activation) conditions. Next, the ‘Message from a peer’ task with the selection of type of behaviour was conducted. Only the online version of the tool was used. Participants were making a choice between two options: ‘forward’ or ‘delete’. Finally, the experience of cyberbullying scale was administered.
44 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Measures
The same 10-item scale of cyberbullying experience was employed as that in Study 1. Both scales proved to be reliable: Mvictim =1.40, SD= 0.56, a =.76, and Mperpetrator =1.41, SD=0.55, a = .78.
Results
To evaluate whether activation of empathy is reducing the likelihood of negative bystander behaviour, logistic regression analysis was conducted, with selected behaviour (0 – inactive, 1 – active) as the dependent variable. In addition, for control purposes, previous experiences of cyberbullying and gender were included in the model. Table 2 presents the logistic regression results for negative bystander behaviour
predicted by gender, previous experience of cyberbullying, and experimental condition (empathy activation). The results show a substantial effect of the experimental condition, significantly decreasing the odds of negative bystander behaviour. In addition, the results show a strong effect of previous experience as perpetrator in predicting negative bystander behaviour. Effects for gender and previous experience as a cyberbullying victim were not significant. These findings are consistent with the previous study.
STUDY 3
The aim of Study 3 was to examine the effects of cognitive empathy on negative bystander behaviour. Research has demonstrated the importance of cognitive empathy in reducing negative behaviour (Batson et al., 1997; Galinsky et al., 2005). The focus has been on two aspects of cognitive empathy: anticipation of (i) emotions experienced by the other person and (ii) the other person’s behaviour in response to the harm to his or her well- being. A number of reports have supported the efficacy of this form of induction (Krevans & Gibbs, 1996; Parke & Swain, 1980) for enhancing the understanding of the conse- quences of one’s own behaviour. It was expected that actively taking the perspective of another person by focusing on the negative consequences of cyberbullying for its victim would decrease the odds of negative bystander behaviour.
Table 2. Logistic regression for cyberbullying and empathy activation
Predictor B SE B Wald’s w2 OR (95% CI)
Gender (0 – girls) �0.35 0.37 0.88 0.70 (0.34–1.46) Experience as perpetrator 1.69 0.37 21.24** 5.43 (2.64–11.13) Experience as victim �0.55 0.42 1.71 0.57 (0.25–1.32) Empathy (0 – no movie) �1.09 0.40 7.45* 0.34 (0.15–0.74)
Overall model w2
Likelihood ratio test 38.72** Score test 44.44** H&L 7.47
**p > .001; *p > .01. Cox & Snell R2 = .12; Nagelkerke R2 = .21; McFadden R2 = .15.
Cyberbullying among adolescent bystanders 45
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Participants
The sample consisted of 288 pupils (140 boys and 148 girls) aged 12–18 years (Mage = 14.83 years, SDage = 1.5 years) from junior high schools and high schools.
Manipulation
To activate two types of cognitive empathy, the same 2-minute movie was used as in Study 2. An instruction activating conscious and reflective processes preceded the video. In the experimental conditions, the participants were instructed to identify with the situation depicted in the video and to focus on those aspects that reflected the victim’s emotions in the first condition and behaviour in the second condition. To activate the process of cognitive empathy, the participants were asked to select from a list of emotions/behaviours that appeared in the recording. In the control condition, the participants were instructed to focus on the elements of the background and were asked to select from a list of elements that appeared in the recording.
Procedure
The nature and place of the study were the same as in Studies 1 and 2. The design of the study followed a simple between-subject experimental design: two types of cognitive empathy activation (focus on emotions vs. behaviour) and a control group with focus on background details.
First, participants watched a short video and completed a short task; then, they were asked to select a behaviour in the ‘Message from a peer’ task. Finally, the scale of previous experience of cyberbullying was applied.
Measures
The same 10-item scale of cyberbullying experience as in Studies 1 and 2 was employed. Both subscales proved to be reliable: Mvictim = 1.39, SD = 0.61, a = .81, and Mperpetrator = 1.39, SD = 0.59, a = .79.
Results
To address the hypothesis concerning the influence of the activation of different aspects of empathy on reducing negative bystander behaviour, hierarchical logistic regression analyses were conducted. In the first step, gender and previous experience with cyberbullying were entered into the model. In the second step, aspects of empathy (dummy coded experimental group) were entered.
Table 3 shows the results of two logistic regression models predicting negative bystander behaviour. The first model shows results consistent with the two previous studies, suggesting that gender and earlier victimisation do not predict negative bystander behaviour, and only past experience as perpetrator is strongly related to behavioural preference. The second model, presenting a better overall fit, shows that both experimental conditions significantly decrease the odds of negative bystander behaviour. There is a slight difference in effect size between the emotion and behaviour conditions. However, it is so little that it does not provide
46 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
a basis for suggesting that one of the methods could be more effective in preventing negative bystander behaviour.
GENERAL DISCUSSION
The purpose of the studies was to identify factors modifying the occurrence of negative bystander behaviour among adolescents. The results indicate that there are three factors that increase the likelihood of negative bystander behaviour occurring: (i) the cyberspace conditions, (ii) the private nature of the act, and (iii) the experience of being a cyberbullying perpetrator. Two factors decreased negative bystander behaviour: (i) affective empathy activation and (ii) cognitive empathy activation. The results of Study 1 confirm the effect of the type of contact. Online contact increased
the likelihood of negative bystander behaviour. This is consistent with other research data on the aspects typical of online interaction, which may increase the propensity for violence (Heirman & Walrave, 2008; Joinson, 1998; McKenna, 2008; McKenna & Bargh, 2000; Suler, 2004). The private dimension of violence proved to be an important factor as the conditions in which a behaviour is accessible to one or only a few observers encourage antisocial choices. This result is in line with data presenting the effects of exposure in the public context, which limits socially disapproved behaviour by activating social norms prohibiting harming others (Wicklund, 1975). Results obtained in Study 2 confirm the role of affective empathy in mitigating the
support of bystanders for cyberbullying activity. In the affective empathy condition, the probability of negative bystander behaviour was significantly lower than that in the control condition. Mere contact with a situation affecting the well-being of another person proved to be sufficient to curb such behaviour. It should be noted that the empathy-activating material (circumstances of a cyberbullying victim) was consistent with the subject matter of the next task: sending a defamatory message online. Thus, affective empathy reduced the analogous behaviour.
Table 3. Logistic regression for cyberbullying and two types of empathy
Predictor B SE B Wald’s w2 OR (95% CI) Block w2
Step 1 86.43*** Gender (0 – girls) 0.21 0.35 0.35 1.24 (0.62–2.46) Experience as perpetrator 2.53 0.49 27.10** 12.56 (4.84–32.44) Experience as victim 0.33 0.39 0.71 1.39 (0.65–2.99) Step 2 7.87* Empathy emotions (0 – background details)
�1.06 0.44 5.86* 0.35 (0.15–0.82)
Empathy behaviour (0 – background details)
�0.95 0.43 4.91* 0.39 (0.17–0.89)
Overall model w2
Likelihood ratio test 94.29*** Score test 89.03*** H&L 9.40
***p < .001; **p < .01; *p < .05. Step 1: Cox & Snell R2 = .26; Nagelkerke R2 = .40; McFadden R2 = .28. Step 2: Cox & Snell R2 = .28; Nagelkerke R2 = .43; McFadden R2 = .31.
Cyberbullying among adolescent bystanders 47
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
The results of Study 3 indicate that actively taking the perspective of another person by focusing on the negative consequences of cyberbullying for its victim reduces bystander behaviour in support of cyberbullying. Underlying this behaviour modification is the ability to ‘mentalise’ (Frith & Frith, 2003), which is unique to the cognitive aspect of empathetic responses. It encourages a deeper understanding of the other person’s circumstances. Both types of induction – emotion and behaviour focused – diminished the likelihood of negative behaviour. Our results are coherent and consistent with those of others concerning the role of empathy (Hoffman, 2000) and perspective taking (Clore & Jeffrey, 1972), which confirms their validity. They also extend the current knowledge on the associations of cyberbullying and empathy, showing that the situational activation of empathy may also limit behaviour supporting online aggression.
The results of all three studies suggest that gender does not affect negative bystander behaviour, which is consistent with others’ results (Ball, 2007; Li, 2006). Experience of being a cyberbullying victim was not found to be associated with involvement in behaviour that supported bullying, whether online or in face-to-face contact. However, being a perpetrator of cyberbullying turned out to be an important predictor of negative bystander behaviour in all of the studies. This result, different from the one concerning cybervictimisation, is in line with earlier studies emphasising the relations between roles in cyberbullying (Walrave & Heirman, 2011; Ybarra & Mitchell, 2004) and can be interpreted in several ways. First, it may reflect a well-rooted propensity for aggression in some adolescents. Second, social learning theory (Bandura, 1973) offers an explanation of this relationship in the form of the effect of being trained to ‘be a perpetrator’.
Unlike most research on the phenomenon of cyberbullying, the present studies employed an experimental method. It seems that this may provide an alternative to prevalent questionnaire- based studies on cyberbullying, which can be particularly problematic because of discrepancy between declaration and behaviour (Ajzen & Fisbein, 1977).
Of course, the present studies have some limitations. First, the results were achieved in a group of adolescents aged 11–18 years, and these cannot be generalised to different age groups. Second, the investigated behaviour is only one of the many possible acts of negative bystander behaviour. Its fairly mild form restricts the possibility of generalising our findings to more severe forms of online violence. Third, we measured cyberbullying bystander behaviour in a specific Internet environment – through the simulation of an instant messenger– which limits the possibility of predicting how respondents would react using different Internet functionalities. Furthermore, our studies made the distinction between the private and public dimension of violence: Private is associated with one-to-one communication, and public, with one-to-many communication. Finally, the methods of empathy activation were a variation of the real-life induction method used by Hoffman (2000). They proved to be equally effective in cyberspace but are not free from shortcomings. Empathy was activated by a video referring to the context of cyberbullying in a between- group experiment. The question whether the activation of empathy in a context which is not specific to cyberbullying would prove to be equally effective in restricting online violence remains open. Also, the design of the studies needs to be enriched by a schema using pretesting and posttesting to give us stronger proof.
The present research programme has certain practical implications. It may serve as the basis for creating various age and ability-specific forms of intervention and prevention that are focused on bystander behaviour – increasingly perceived as the key for solving the problem of cyberbullying (Kraft, 2011; Spears et al., 2008). Although the decision to
48 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
interrupt bullying makes bystanders become part of the solution in both real life and cyber space, this seems to operate in different ways in each environment. In real life, individuals must actively do something to intervene. In cyber space, individuals must actively choose not do something (Spears et al., 2008). That is why encouraging adolescents not to forward cyberbullying material seems to have special importance in preventing and stopping cyberbullying. The confirmation of the efficiency of empathy in curbing negative bystander behaviour
seems to be an important conclusion of this study. The basic embodied processes of affective empathy and generation of the more complex, cognitive functions of empathy by employing induction may prove helpful in achieving this outcome. Both aspects of accessi- bility to an external perspective appear to play a fundamental part in limiting behaviour that supports cyberbullying.
ACKNOWLEDGEMENT
The presented research was financed by Grant DSM101613 from the Faculty of Psychology at the University of Warsaw.
REFERENCES
Ajzen, I., & Fisbein, M. (1977). Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological Bulletin, 84, 888–918.
Ball, S. (2007). Bystanders and bullying: A summary of research for Anti-Bullying Week. Retrieved March 3, 2012, from http://www.anti-bullyingalliance.org.uk/pdf/Bystanders_and_Bullying.pdf
Bandura, A. (1973). Aggression: A social learning analysis. Englewood Cliffs, NJ: Prentice- Hall. Barlinska, J., & Wojtasik, Ł. (2008). Peer violence and electronic media – Research and social
campaign. In M. Barbovschi, & M. Diaconescu (Eds.), Teenagers’ actions and interactions online in Central and Eastern Europe. Potentials and empowerment, risks and victimization (pp. 281–299). Cluj-Napoca, Romania: Cluj University Press Babes- Bolyai University.
Batson, C. D. (1991). The altruism question: Toward a social-psychological answer. Hillsdale, NJ: Lawrence Erlbaum Associates.
Batson, C. D., Polycarpou, M. P., Harmon-Jones, E., Imhoff, H. J., Mitchener, E. C., Bednar, L. L., & Highberger, L. (1997). Empathy and attitudes: Can feeling for a member of a stigmatized group improve feelings toward the group? Journal of Personality and Social Psychology, 72, 105–118.
Belsey, B. (2008). Cyberbullying: An emerging threat to the “Always On” generation. Retrieved October 13, 2009, from http://www.cyberbullying.ca/pdf/Cyberbullying_Article_by_Bill_Belsey. pdf
Boyd, D. (2007). Why youth (heart) social network sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.), McArthur Foundation on Digital Learning – Youth, identity, and digital media volume (pp. 119–142). Cambridge, MA: MIT Press.
Chalmers J. B., & Townsend, R. (1990). The effect of training in social perspective taking on socially maladjusted girls. Child Development, 61, 178–190.
Clore, G. L., & Jeffrey, K. M. (1972). Emotional role playing, attitude change and attraction toward a disabled person. Journal of Personality and Social Psychology, 23, 105–111.
Davis, M. H. (1994). Empathy: A social psychological approach. Madison, WI: Brown & Benchmark Publishers.
Decety, J., & Jackson, P. L. (2004). The functional architecture of human empathy. Behavioral Cognition Neuroscience Review, 3, 71–100.
Dehue, F., Bolman, C., & Vollink, T. (2008). Cyberbullying: Youngsters’ experiences and parental perception. CyberPsychology and Behaviour, 11, 217–223.
Cyberbullying among adolescent bystanders 49
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Eisenberg, N. (2000). Emotion, regulation and moral development. Annual Review of Psychology, 51, 665–697.
Eisenberg, N., Fabes, R. A., Carlo, G., Speer, A. L., Switzer, G., Karbon, M., & Troyer, D. (1993). The relations of empathy-related emotions and maternal practices to children’s comforting behavior. Journal of Experimental Child Psychology, 55, 131–150.
Frith, U., & Frith, C. D. (2003). Development and neuropsychology of mentalizing. Philosophical Transactions of the Royal Society Biological Sciences, 358, 459–473.
Galinsky, A. D., Ku, G., & Wang, C. S. (2005). Perspective-taking: Fostering social bonds and facilitating social coordination. Group Process and Intergroup Relations, 8, 109–125.
Heirman, W., & Walrave, M. (2008). Assessing Concerns and Issues about the Mediation of Technology in Cyberbullying. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 2(2), 1–12.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156.
Hoffman, M. L. (1982). Development of prosocial motivation: Empathy and guilt. In N. Eisenberg (Ed.), Development of Prosocial Behaviour (pp. 281–299). New York, NY: Academic Press.
Hoffman, M. L. (2000). Empathy and moral development: Implications for caring and justice. Cambridge, UK: Cambridge University Press.
Joinson, A. N. (1998). Causes and implications of disinhibited behavior on the Internet. In J. Gackenbach (Ed.), Psychology and the Internet (pp. 43–60). San Diego, CA: Academic Press.
Jolliffe, D., & Farrington, D. P. (2004). Empathy and offending: A systematic review and meta-analysis. Aggression and Violent Behavior, 9, 441–476.
Kowalski, R. M. (2008). Cyber bullying: Recognizing and treating victim and aggressor. Psychiatric Times, 25 (pp. 1–2). Retrieved September 8, 2011, from http://www.psychiatrictimes.com/ display/article/10168/1336550
Kraft, E. (2011). Online Bystanders: Are they the key to preventing cyberbullying. Retrieved February 3, 2012, from http://www.elementalethics.com/files/Ellen_Kraft_PhD.pdf
Krevans, J., & Gibbs, J. C. (1996). Parents’ use of inductive discipline: Relations to children’s empathy and prosocial behaviour. Child Development, 67, 3263–3277.
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27, 157–170.
McKenna, K. Y. A. (2008). Influence on the nature and functioning of social groups. In A. Barak (Ed.), Psychological Aspects of Cyberspace: Theory, research and applications (pp. 228–242). New York, NY: Cambridge University Press.
McKenna, K. Y. A., & Bargh, J. A. (2000). Plan 9 from cyberspace: The implications of the Internet for personality and social psychology. Personality and Social Psychology Review, 4(1), 57–75.
Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford, UK: Blackwell. Parke, R. D., & Slaby, R. G. (1983). The development of aggression. In P. H. Mussen (Series Ed.), &
E. M. Hetherington (Vol. Ed.), Handbook of child psychology Vol. 4: Socialization, personality and social development (pp. 574–642). New York, NY: Wiley.
Parke, R. D., & Swain, D. B. (1980). Empathy and fear as mediators of resistance to deviation in children. Merrill-Palmer Quarterly, 26, 123–134.
Robinson, G., & Maines, B. (1997). Crying for help: The no blame approach to bullying. Bristol, UK: Lucky Duck Publishing Ltd.
Salmivalli, C. (1999). Participant role approach to school bullying: Implications for interventions. Journal of Adolescence, 22, 453–9.
Singer, T., & de Vignemont, F. (2006). The emphatic brain: How, when and why? Trends in Cognitive Sciences, 10, 435–441.
Slonje, R., & Smith, P. K. (2007). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 1–8.
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385.
Spears, B. A., Slee, P. T., Owens, L., & Johnson, B. (2008). Behind the Scenes: Insights into the Human Dimension of Covert Bullying. Report prepared for Department of Education, Employment and Workplace Relations: Canberra.
50 J. Barlińska et al.
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Steffgen, G., & König, A. (2009). Cyber bullying: The role of traditional bullying and empathy. In B. Sapeo, L. Haddon, E. Mante-Meijer, L. Fortunati, T. Turk, & E. Loos (Eds.), The good, the bad and the challenging. Conference Proceedings (Vol. II, pp. 1041–1047). Brussels, Belgium: Cost office.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology and Behaviour, 7, 321–326. Twemlow, S. W., Fonagy, P., Sacco, F. C., Gies, M. L., & Hess, D. (2001). Improving the social and
intellectual climate in elementary schools by addressing the bully-victim- bystander power struggles. In J. Cohen (Ed.), Caring classrooms, intelligent schools: The social emotional education of young children (pp. 162–182). New York, NY: Teachers College Press.
Walrave, M., & Heirman, W. (2011). Cyberbullying: Predicting victimization and perpetration. Children & Society, 25, 59–72.
Watson, D., Clark, L. A., & Tellegen, A. (1988). Development and validation of brief measures of positive and negative affect: The PANAS Scales. Journal of Personality and Social Psychology, 47, 1063–1070.
Wicklund, R. A. (1975). Objective self-awareness. Advances in Experimental Psychology, 9, 233–275. Willard, N. E. (2006). Cyberbullying and cyberthreats: Responding to the challenge of online social
aggression, threats, and distress. Eugene, OR: Center for Safe and Responsible Internet Use. Williams, K. R., & Guerra, N. G. (2007). Prevalence and predictors of internet bullying. Journal of
Adolescent Health, 41, 14–21. Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison
of associated youth characteristics. Journal of Child Psychology and Psychiatry, 7, 1308–1316.
Cyberbullying among adolescent bystanders 51
Copyright © 2012 John Wiley & Sons, Ltd. J. Community Appl. Soc. Psychol., 23: 37–51 (2013)
DOI: 10.1002/casp
Copyright of Journal of Community & Applied Social Psychology is the property of John Wiley & Sons, Inc.
and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright
holder's express written permission. However, users may print, download, or email articles for individual use.
Electronic Bullying and Victimization and Life Satisfaction in Middle School Students
Page Malmsjo Moore • E. Scott Huebner • Kimberly J. Hills
Accepted: 1 May 2011 / Published online: 25 May 2011 � Springer Science+Business Media B.V. 2011
Abstract This study examined the nature and prevalence of electronic bullying and victimization in a sample of middle school students in a southeastern USA school. Rela-
tionships among measures of electronic bullying and victimization and global and domain-
specific life satisfaction were also investigated. A total of 855 7th and 8th grade US
students responded to questions regarding global and domain-based life satisfaction,
electronic bullying and victimization behaviors. Although a majority of students reported
not engaging in or being the victim of electronic bullying, the small percentage of students
who did report these behaviors as being problematic indicated that the behaviors occurred
several times a week. Statistically significant correlates of electronic bullying were self-
reported grades in school, gender, and parent marital status. Significant correlates of
victimization were self-reported grades in school, parent marital status, and ethnicity. The
results suggested modest, but pervasive relationships between experiences of electronic
bullying and victimization and adolescents’ life satisfaction reports across a variety of
important life domains. When the effects of demographic variables were controlled, the
relationship between electronic victimization and global life satisfaction became non-
significant, suggesting that global life satisfaction reports may mask the effects of specific
life satisfaction domains.
Keywords Bullying � Electronic bullying � Electronic victimization � Life satisfaction
1 Introduction
On an annual basis in the USA, researchers estimate that more than 3.7 million students in
grades 6–10 engage in moderate or serious bullying while more than 3.2 million students
are victims of moderate or serious bullying (Nansel et al. 2001). Research in the United
Kingdom has also shown that during adolescence, a great deal of violence in schools is due
to students bullying their peers (Boulton 1999). One contemporary meta-analysis of studies
P. M. Moore � E. S. Huebner (&) � K. J. Hills Department of Psychology, University of South Carolina, Columbia, SC 29208, USA e-mail: [email protected]
123
Soc Indic Res (2012) 107:429–447 DOI 10.1007/s11205-011-9856-z
of bullying behaviors spanning nine countries found that the prevalence of bullying others
or having been bullied (at least once in the last 2 months) was 20.8% for physical bullying,
53.6% for verbal bullying, 51.4% for social bullying, and 13.6% for electronic bullying
(Wang et al. 2009). A survey of almost 16,000 USA students in grades 6–10 found that
almost 30% of their sample reported frequent involvement in some form of bullying. More
specifically, approximately 13% were bullies, 10.6% were victims, and 6% were bully/
victims (i.e., bullying others as well as experience bullying; Nansel et al. 2001). Overall,
school bullying has been identified as a major concern among adolescents and school
professionals in multiple nations (Boulton et al. 2008; Hawker and Boulton 2000).
Based on research findings, it has been said that ‘‘bullying may be the most prevalent
form of violence in the schools’’ (Batsche and Knoff 1994, p. 166). One disturbing
reminder of potential violence associated with bullying is found in the research results of a
study conducted by the United States Secret Service. In an effort to better understand
bullying behavior and the potential consequences, the United States Secret Service
embarked on an in-depth investigation of 41 school shooters with incidents having
occurred between 1974 and 2000. Through interviews of both friends and family members,
it was found that 71% of the shooters had been targets of bullying (Vossekuil et al. 2002).
Unfortunately, as the previously mentioned research illustrates, bullying in schools is both
serious and pervasive in nature.
Although the number of students engaged in or targeted by bullying behaviors is
problematic in and of itself, the potential impact on outcomes such as school achievement,
prosocial skills, and psychological well-being for both the victims and perpetrators makes
this phenomenon even more significant (Boulton et al. 2008; Hawker and Boulton 2000).
Chronic victims of bullying report various physical and mental health problems, including
low self-esteem and depression. Victims are also more likely to bring weapons to school
and contemplate suicide as compared to their non-bullied peers (Olweus 1993). Interest-
ingly, negative outcomes associated with bullying behaviors are not limited to the victims
as many often believe. Research has also found that students who engage in bullying
behaviors are more likely to underachieve in school, drop out of school, engage in
delinquent or criminal acts, and become abusive spouses or parents (Olweus 1993).
Despite the fact that research on traditional bullying is vast in comparison, only a
handful of studies have focused specifically on electronic bullying among children and
youth (Kowalski and Limber 2007). In the USA alone, approximately 87% of children
aged 12–17 use the internet daily and 45% own cell phones (Lenhart et al. 2005). Even
though technology is a part of almost every student’s life, relatively little empirical
research related to electronic bullying has been done (Nansel et al. 2001; Williams and
Guerra 2007; Ybarra and Mitchell 2004a). Considered a contemporary form of bullying,
electronic bullying, often referred to as cyber-bullying or online social cruelty, includes
bullying through e-mail, instant messaging, websites, chat rooms, or through digital images
or messages sent via cell phone (Kowalski and Limber 2007). According to the Director for
the Center for Safe and Responsible Internet Use, electronic bullying is discourse that is
‘‘defamatory, constitutes bullying, harassment, or discrimination, discloses personal
information, or contains offensive, vulgar or derogatory comments’’ (Willard 2003, p. 66).
Essentially, youth utilize electronic means of bullying in order to insult, threaten, taunt,
harass, or intimidate a peer (Raskauskas and Stoltz 2007).
Hinduja and Patchin (2008) suggested that this newer form of bullying is the ‘‘unfor-
tunate by-product of the union of adolescent aggression and electronic communication, and
its growth is giving cause for concern’’ (p. 131). One recent survey indicated that more
than 13 million children in the USA aged 6–17 were victims of electronic bullying.
430 P. M. Moore et al.
123
Overall, approximately one-sixth of primary school age children and one-third of teens
reported that they had been threatened, called names, or embarrassed by information
shared about them on the internet (Fight Crime: Invest in Kids 2006). Although a large
portion of actual electronic bullying behaviors occur outside of the school setting,
researchers suggest that these incidents appear to relate to the functioning of students at
school as well as the school environment itself, highlighting the importance of investi-
gating this aggressive behavior within the school system (David-Ferdon and Hertz 2007).
Electronic bullying has been distinguished from traditional forms of bullying. To begin,
traditional bullying is typically defined as verbal or physical behaviors that occur
repeatedly over time, which are characterized by an imbalance of strength or power
(Olweus 1993). Bullying occurs when a student is repeatedly harmed in some way, either
psychologically and/or physically, by another student or a group of students. Typically,
bullies tend to be physically, psychologically, or socially stronger than the children they
bully. Traditional bullying can also include more overt physical acts such as shoving and
hitting, as well as verbal abuse, such as name-calling and taunting. Traditional bullying can
also take on more indirect forms, including rumor spreading and social exclusion (Olweus
1993, 1994).
Results of one anonymous web-based survey of 12–17 year old youth found that, within
a year’s time, 72% of respondents reported at least one online incident of bullying, 85% of
whom also experienced bullying in school (Juvonen and Gross 2008). Researchers found
that, when controlling for internet use, repeated experiences of school-based bullying
increased the likelihood of repeated electronic bullying, which indicates an overlap in
experiences across both contexts. An 85% overlap between online and in-school bullying
suggests that electronic space is not an independent environment, but rather it seems to be
another forum that essentially extends the school grounds (Juvonen and Gross 2008).
Interestingly, students’ roles in traditional bullying have also been found to predict the
same roles in electronic bullying (Raskauskas and Stoltz 2007). For example, traditional
bullies tend to also be electronic bullies while victims of traditional bullying are also likely
to be victims of electronic bullying (Beran and Li 2005). Approximately 64% of students
surveyed in another study reported that electronic bullying was most likely to start at
school as traditional bullying and subsequently continue at home by the same students
(Cassidy et al. 2009). For some victims of bullying, the internet may just be an ‘‘extension
of the schoolyard, with victimization continuing after the bell and on into the night’’
(Ybarra and Mitchell 2004a, p. 1313).
Although similar in many ways, the literature also establishes that meaningful differ-
ences exist between traditional bullying and electronic bullying, further highlighting the
need for additional research (Brown et al. 2006; Kowalski and Limber 2007). One of the
primary differences between these forms of bullying is the continuous, unrelenting nature
of electronic bullying. Essentially, traditional bullying is typically confined to a particular
place or time, whereas electronic bullying is almost limitless in nature (Kowalski et al.
2008). Victims of electronic bullying cannot easily escape as this form of harassment can
occur in almost any context, at any time of the day via electronic means (Brown et al.
2006; Willard 2006). Another significant difference between traditional bullying and
bullying via electronic means involves the component of anonymity (Brown et al. 2006;
Kowalski and Limber 2007; Ybarra and Mitchell 2004a). Unlike traditional forms of
bullying, research has found that almost half of the victims of electronic bullying do not
know the identity of the perpetrator (Kowalski and Limber 2007). Because individuals are
hidden behind the security and anonymity of a computer screen, youth engaged in online
bullying might act differently than they normally would, letting go of traditional
Electronic Bullying and Life Satisfaction 431
123
inhibitions (Berson and Berson 2005; Ybarra and Mitchell 2004b). Interestingly, the
internet may actually provide an opportunity for victims of electronic bullying to com-
municate without fear, allowing for possible revenge against perpetrators (Kowalski and
Limber 2007). Although very preliminary, some research has suggested that electronic
bullying may in fact be more damaging to youth compared to traditional bullying, resulting
in issues such as anxiety, anger, low self-esteem, depression, poor academic performance,
school absenteeism, and even suicide (Willard 2006).
Researchers have begun to explore the prevalence and correlates of electronic bullying
and victimization. A study conducted by the United States Department of Education found
that 90% of children ages 5–17 use computers, and 59% (31 million) have access to the
Internet (DeBell and Chapman 2003). With literally millions of children utilizing the
internet, it is critical to understand prevalence rates as well as possible factors that con-
tribute to perpetration and victimization. In general, prevalence rates indicate that internet
bullying and victimization rates are around 25%, and that this form of bullying has become
a global phenomenon (Aricak et al. 2008; Kowalski and Limber 2007; Willard 2006). One
study of electronic bullying among middle school students found that 22% of students
reported involvement in electronic bullying, including 4% as bullies, 11% as victims, and
7% as both bully-victim (Kowalski and Limber 2007). Results from a survey of 5th, 8th,
and 11th grade students found that 9.4% of the students admitted that they had bullied
others via e-mail or instant messaging (Williams and Guerra 2007). Overall, it has been
estimated that more than 13 million children in the USA ages 6–17 are victims of elec-
tronic bullying (Fight Crime: Invest in Kids 2006).
Understanding the nature and frequencies of electronic bullying is important. It is also
important to understand the correlates and potential warning signs associated with per-
petration and victimization. Warning signs related to victimization include withdrawing
from friends and family members, becoming upset about going to school or going outside,
avoiding discussions related to activities on the computer, showing feelings of anger,
anxiety, or depression following use of the computer, and suddenly not using the computer
anymore (Hinduja and Patchin 2007a). In addition, other signs of victimization include
having been a victim of traditional bullying at school, a decrease in academic performance,
and avoidance of school (Kowalski and Limber 2007). Warning signs related to offending
behavior include using the computer at all hours, creating multiple online accounts, and
quickly closing or switching screens in the presence of others, avoiding discussions related
to activities on the computer, and becoming unusually upset if access to the computer is
restricted (Hinduja and Patchin 2007a).
Research has suggested potential warning signs for electronic victimization as well.
Overall, research indicates that victims tend to be excluded and rejected by their peers
more than bullies (Hawker and Boulton 2000; Juvonen et al. 2003). Victims of electronic
bullying may also withdraw from school activities, and become ill, depressed, or even
suicidal (Willard 2006). As part of a statewide bullying prevention initiative in Colorado,
youth in grades 5, 8, and 11 were surveyed regarding internet bullying, physical bullying,
and verbal bullying. The results revealed that internet bullying peaked in middle school
and declined in high school, making adolescents a particularly vulnerable population.
Interestingly, all three forms of bullying were significantly related to negative peer support,
negative school climate, and normative beliefs condoning bullying, which may serve as
potential risk indicators (Williams and Guerra 2007). Furthermore, the amount of time a
youth spends on the internet as well as their level of computer proficiency have both been
implicated in victimization (Wang et al. 2009).
432 P. M. Moore et al.
123
A handful of studies has investigated the presumed outcomes of electronic bullying and
victimization. Electronic bullying has been linked to multiple maladaptive emotional,
psychological, and behavioral outcomes (Patchin and Hinduja 2006). Similar to traditional
bullying, victims of electronic bullying have been found to display more negative psy-
chological and emotional outcomes, particularly, feelings of anger, frustration, and
depression (Hinduja and Patchin 2007a). Victims of electronic bullying have also been
found to be more likely to report skipping school as well as receiving two or more
detentions or suspensions. Furthermore, youth who report being victims of internet
harassment were found to be eight times more likely than other youth to report carrying a
weapon to school (Wolak et al. 2007; Ybarra et al. 2007a, b).
Victims are not the only at risk population facing negative consequences in regards to
this modern form of bullying. Research suggests that students that engaging in internet
bullying also experience multiple psychosocial challenges including substance use,
delinquency, and poor parent–child relationships (Aricak et al. 2008; Raskauskas and
Stoltz 2007; Ybarra and Mitchell 2004a, b).
Although previous research has examined relationships between electronic bullying and
victimization and a variety of traditional indicators of adolescent mental health, there have
been few studies investigating relationships to individual differences in adolescents’ life
satisfaction (Willkins-Shurmer et al. 2003). Life satisfaction is defined as an individual’s
cognitive appraisal of the positivity of her or his own quality of life overall or with specific
domains, such as family, friends, or community experiences (Diener 1984). Although
related to measures of mental health, life satisfaction measures are distinguishable from
measures of depression, anxiety, and so forth. Contextualized within the emerging positive
psychology perspective, life satisfaction measures extend beyond assessments of the
presence of psychological symptoms or low levels of life satisfaction to assessments that
differentiate satisfaction levels above a neutral point (i.e., the absence of dissatisfaction).
Thus, life satisfaction measures can be designed to differentiate among satisfaction levels
that range from ‘‘low’’ to ‘‘neutral’’ to ‘‘mildly high’’ to ‘‘very high’’, and so forth. In this
manner, life satisfaction measures provide a more finely grained analysis of individuals’
well-being (Diener 1984).
The few studies that have investigated life satisfaction and bullying behaviors have
focused on the victimization component, excluding the possible link between life satis-
faction and perpetration. In one of the only empirical studies that examined the relation-
ships between bullying and adolescents’ life satisfaction, Flaspohler et al. (2009) found
that students who bully and/or are bullied experience reduced life satisfaction and support
from peers and teachers as compared to children who are neither victims nor perpetrators
of bullying. After controlling for gender and grade, students who were not engaged in
bullying reported higher levels of life satisfaction as compared to peers who were bullies or
who were bullied. In addition, results from this study found that students who were both
bullies as well as victims fared the worst in regard to life satisfaction, indicating a potential
additive effect of being both of a bully and victim (Flaspohler et al. 2009).
1.1 Aims of the Current Study
Despite the attention electronic bullying has gained in the popular media, little empirical
research on the antecedents and consequences of electronic bullying actually has been
undertaken (Cook et al. 2007). With millions of children using the internet and electronic
devices every day, it becomes apparent that continued research in the area of electronic
aggression and electronic bullying is imperative. To date, researchers have not examined
Electronic Bullying and Life Satisfaction 433
123
associations between electronic bullying and victimization and life satisfaction in ado-
lescents. Furthermore, while only a few studies have specifically examined bullying
behaviors and life satisfaction, the studies relied upon reports of global or overall life satisfaction. Recent findings suggest there may be benefits to using multidimensional
measures to fully assess life satisfaction. For example, in their examination of life satis-
faction among adolescents, Antaramian et al. (2008) found that family structure differences
(i.e., intact vs. non-intact families) were not related to adolescents’ reports of their general
life satisfaction but did relate to their reports of their satisfaction with their family life
suggesting that general life satisfaction reports may mask differences among various
specific life domains.
In an effort to better distinguish among these domains, a multi-faceted measure (i.e.,
Multidimensional Students’ Life Satisfaction Scale: Huebner 1994) and a global measure
of life satisfaction (Students’ Life Satisfaction Scale: Huebner 1991) were employed
together in this study. In this manner, an assessment of adolescents’ global life satisfaction
was obtained along with assessments across five important, specific domains, including
family, friends, school, living environment, and self. This approach was expected to
provide a more comprehensive, contextualized approach relative to previous studies of the
correlates of electronic bullying and victimization.
This exploratory study thus evaluated the relationships among electronic bullying and
victimization and global life satisfaction and satisfaction with specific life domains (e.g.,
family, school) in middle school students. In addition, the current study examined the
frequencies and demographic correlates of electronic bullying and victimization among
middle school students. As such, three major research questions were investigated,
including:
1. What are the frequencies of major forms of electronic bullying and electronic
victimization in a sample of middle school students?
2. What are the relationships among demographic variables (i.e., age, gender, ethnicity,
socio-economic status, self reported grades, and parent status) and electronic bullying
and electronic victimization?
3. What are the relationships among electronic bullying and electronic victimization and
adolescents’ reports of global and domain-specific life satisfaction (i.e., family, school,
friends, living environment, and self)?
2 Method
2.1 Participants
Students in a large middle school (grades 7 and 8) in the Southeastern USA completed
measures of life satisfaction and electronic bullying and electronic victimization as part of
a larger survey of school climate administered and conducted by school personnel. After
accounting for absences and students whose parents refused permission to participate
(n = 11), a total of 910 students were administered survey packets. After eliminating incomplete surveys, a total of 855 (409 boys and 446 girls) students were included in the
analyses. This sample included 443 seventh-grade (214 boys and 229 girls) and 412 eighth-
grade students (195 boys and 217 girls). The mean age of participants was 13
(SD = .76 years). A total of 59% of the participants were Caucasian, 28% were African
American, 3% were Asian American or Pacific Islander, and 2.6% were Hispanic.
434 P. M. Moore et al.
123
Approximately 22% of students reported receiving free or reduced lunch, which was used
as an estimate of socio-economic status (SES). Also, 62.5% of students reported that they
lived with both their biological mother and father, while the remaining 37.5% reported
living with other combinations of adults (i.e., mother and step-father, father and step-
mother, or other adults). Finally, 59.1% of students reported that their parents were mar-
ried, 23.7% reported their parents were divorced, and the remaining 7.2% reported their
parents were separated, never married, or widowed.
2.2 Measures
2.2.1 Electronic Bullying and Victimization
For the purposes of this study, an adaptation of Kowalski and Limber’s (2007) Electronic
Bullying Questionnaire (EBQ) was used. The EBQ is a 23-item self-report measure that
was developed for the purpose of assessing electronic bullying among middle school
students. In the development of the EBQ, Kowalski and Limber (2007) defined electronic
bullying as ‘‘bullying through e-mail, instant messaging, in a chat room, on a website, or
through a text message sent to a cell phone.’’ The EBQ was patterned in part after the
Olweus Bully/Victim Questionnaire (Olweus 1996), a reliable and valid self-report mea-
sure that assesses participants’ experiences with bullying, both as victims and perpetrators
(Olweus 1996; Solberg and Olweus 2003). Similar to the Olweus measure, the EBQ
includes questions about participants’ experiences with bullying (i.e., both being bullied by
and bullying others). Important questions included, ‘‘How often have you been bullied
electronically in the past couple of months?’’ and ‘‘How often have you electronically
bullied someone in the past couple of months?’’
Because of space and time constraints, the original 23-item questionnaire was reduced
to nine core questions that assessed bullying (four questions), victimization (four ques-
tions), and fear of being bullied (one question), eliminating questions concerning how
bullying or victimization occurs (e.g., instant message, text, email). With the exception of
one question aimed at determining how often the participant is afraid of being bullied
electronically, students were asked to respond using the five-point response format from
the Olweus Bully/Victim Questionnaire (i.e., it hasn’t happened in the past couple of
months; only once or twice; two or three times a month; about once a week; several times a
week).
At the time of this study, data on the reliability and validity of the EBQ were not
available. For the current sample, however, coefficient alphas were .83 for the victim-
ization items and .86 for the bullying items, suggesting acceptable internal consistency
reliabilities for the measures. In addition, the mean inter-item correlation value was .41,
with values ranging from .17 to .71, suggesting modest to moderate relationships among
the items.
2.2.2 Multidimensional Students’ Life Satisfaction Scale
Adolescents’ life satisfaction judgments were assessed by the Multidimensional Students’
Life Satisfaction Scale (MSLSS: Huebner 1994). The MSLSS is a 40-item self-report scale
designed for children ages 8–18. Responses are made using a 6-point Likert scale, ranging
from 1 = strongly disagree to 6 = strongly agree. The MSLSS assesses satisfaction across
five important life domains, including family, friends, school, living environment, and self.
Total scores were obtained for each domain by summing the individual items within each
Electronic Bullying and Life Satisfaction 435
123
domain and then dividing by the total number of items within the domain. Support for the
reliability and validity of the MSLSS have been provided in prior studies (e.g., Huebner
1994; Huebner et al. 1998). Alpha coefficients for the domain-based scores have typically
been reported in the .70–.90 range (Gilman et al. 2000; Huebner 1994), with similar test–
retest coefficients for 2- and 4-week periods (Huebner et al. 1998). In addition, convergent
and discriminant validity has been demonstrated through appropriate correlations with
parent reports and other self-report measures (Gilman et al. 2000; Huebner 1994).
2.2.3 Students’ Life Satisfaction Scale
The Students’ Life Satisfaction Scale (SLSS: Huebner 1991) is a 7-item self report scale
designed to assess global life satisfaction in children and adolescents ages 8–18. Like the
MSLSS, students rate each item on a 6 point Likert scale response format from
1 = Strongly Disagree to 6 = Strongly Agree. In addition, two items on the scale are reverse scored. Responses were summed and averaged to obtain a mean global life sat-
isfaction score. The SLSS has consistently demonstrated high reliability and validity.
Internal consistency has been reported to range from .82 to .90, test–retest reliability has
been reported as .76 over a 2-week interval, and inter-item correlations have ranged from
.49 to .73 (Dew and Huebner 1994; Huebner 1991).
2.3 Procedures
During spring 2009, data collection was conducted by the school teachers in their respective
home rooms as part of a school-wide assessment of school climate. Passive consent was
obtained from parents, resulting in 910 students allowed to participate in the study. A total
of 11 students were not allowed to participate. The current study was conducted with
permission from the school district, allowing for use and analysis of their archival data.
Survey packets containing student names and unique identification numbers were dis-
tributed to each homeroom teacher at the middle school. The homeroom teachers dis-
tributed the surveys to their students at the start of the homeroom period as well as read
specific instructions regarding the purpose of the study and the confidentiality of student
responses in order to increase the likelihood of truthful responses. In an effort to control for
possible sequencing effects, a majority of the measures were counterbalanced across
individuals. However, two exceptions to this counterbalancing method were made. Paired
with demographic items, the SLSS was completed first by all students while the EBQ was
completed last. In order to guarantee confidentiality, student identification numbers were
used to ensure confidentiality.
2.4 Data Analysis
Descriptive statistics were calculated. Spearman rho and Pearson correlations were cal-
culated for demographic variables and predictor and criterion variables. The amount of
missing data for the MSLSS, SLSS, and EBQ was small, ranging from .5 to 4.5%. Given
the small amount of missing data, and in order to retain an adequate sample size and
statistical power, mean substitution procedures were used to handle missing data (Buhi
et al. 2008).
Hierarchical regression analyses were subsequently employed to determine the unique
relationships among electronic bullying and victimization and the life satisfaction scores,
436 P. M. Moore et al.
123
after partialling out the effects of demographic variables. Before proceeding to the
regression analyses, normality of criterion variables was assessed by plotting histograms.
Upon inspection, it was observed that friend satisfaction and self satisfaction scores were
not normally distributed and demonstrated excessive skew (-1.98 and -1.55 respectively)
and kurtosis (5.05 and 3.15 respectively). Despite violation of the normality assumptions,
parametric tests were utilized for several reasons. The effect of the violation of the nor-
mality assumption on significance tests depends on the sample size, with problems
occurring in smaller samples (Cohen et al. 2003). With larger sample sizes, such as the
current study, non-normality does not lead to serious problems with significance tests. In
addition, both square root and log transformations were conducted, neither of which
changed the shape of the distributions. The remaining criterion variables appeared
approximately normal and exhibited skew and kurtosis levels within acceptable limits
(between -1.0 and 1.0).
3 Results
Frequencies, means and standard deviations for life satisfaction, electronic victimization,
and electronic bullying are summarized in Tables 1, 2 and 3. When asked about bullying
and victimization in the past few months, 86% of participants reported that they did not
partake in any form of electronic bullying while 80% reported they were not victims.
Overall, participants self-reported moderate levels of global life satisfaction as measured
by the SLSS (M = 4.55, SD = 1.06). The MSLSS domain scores indicated that partici- pants were most satisfied with their friends (M = 5.31, SD = .87) and least satisfied with school (M = 4.37, SD = 1.27).
Electronic bullying was found to be significantly correlated with gender (r = .13, p \ .001), parent marital status (r = .10, p \ .005), and self-reported grades in school (r = -.18, p \ .001). Electronic victimization was significantly correlated with ethnicity (r = .08, p \ .05), grade (r = -.07, p \ .05), SES (r = .07, p \ .05), parent status (r = .09, p \ .01, and self-reported grades in school (r = -.23, p \ .001). Global life satisfaction (i.e., SLSS scores) was significantly correlated with parent custody (r = -.15 p \ .001), parent status (r = -.20, p \ .001) and self-reported grades in school (r = .29, p \ .001). Family satisfaction was correlated with parent custody (r = -.09, p \ .01), parent status (r = -.15, p \ .001) and self-reported grades in school (r = .20, p \ .001). Friend satisfaction was correlated with gender (r = .16, p \ .001), parent status (r = -.07, p \ .05) and self-reported grades in school (r = .11, p \ .05). Living satisfaction
Table 1 Descriptive statistics for measures
Scoring of SLSS: 1 = Strongly Disagree to 6 = Strongly Agree; Scoring of MSLSS: 1 = Strongly Disagree to 6 = Strongly Agree
Variable M SD
SLSS 4.55 1.06
Family satisfaction 4.76 1.20
Friend satisfaction 5.31 .87
Living satisfaction 4.80 1.19
Self satisfaction 5.14 .86
School satisfaction 4.37 1.27
Electronic bullying 1.36 .69
Electronic victimization 1.18 .49
Electronic Bullying and Life Satisfaction 437
123
T a
b le
2 F
re q u e n c ie
s o f
e le
c tr
o n ic
b u ll
y in
g a n d
v ic
ti m
iz a ti
o n
E B
Q e le
c tr
o n ic
v ic
ti m
iz a ti
o n
q u e st
io n s
H a v e n ’t
O n c e
o r
tw ic
e 2 – 3
a m
o n th
O n c e
a w
e e k
S e v e ra
l ti
m e s
H o
w o ft
e n
h a v e
y o u
e le
c tr
o n ic
a ll
y b u ll
ie d
so m
e o n e
in th
e p a st
c o u p le
o f
m o n th
s? 6 8 0
1 1 3
2 0
1 8
2 3
H a v
e y
o u
m a d
e fu
n o
f so
m e o
n e
o r
te a se
d so
m e o
n e
e ls
e in
a h
u rt
fu l
w a y
… ?
6 7
5 1
1 4
3 7
9 2
2
H a v
e y
o u
to ld
li e s
o r
sp re
a d
ru m
o rs
a b o
u t
so m
e o
n e
e ls
e …
? 5
6 6
1 8
0 5
4 1
8 3
9
H a v
e y
o u
u se
d so
m e o
n e
e ls
e ’s
c o
m p
u te
r u
se rn
a m
e o
r sc
re e n
-n a m
e to
sp re
a d
ru m
o rs
o r
li e s
a b
o u
t a n
o th
e r
p e rs
o n
? 7
7 9
4 3
1 5
5 1
5
E B
Q e le
c tr
o n ic
b u ll
y in
g q u e st
io n s
H a sn
’t O
n c e
o r
tw ic
e 2 – 3
a m
o n th
O n c e
a w
e e k
S e v e ra
l ti
m e s
H o
w o ft
e n
h a v e
y o u
b e e n
b u ll
ie d
e le
c tr
o n ic
a ll
y in
th e
p a st
c o u p le
o f
m o n th
s? 7 3 6
8 7
1 6
6 1
2
H a s
a n
y o
n e
m a d e
fu n
o f
y o
u o
r te
a se
d y
o u
in a
h u
rt fu
l w
a y …
? 6
9 3
1 2
0 2
9 4
1 0
H a s
a n
y o
n e
to ld
li e s
o r
sp re
a d
ru m
o rs
a b
o u
t y
o u …
? 7
5 9
7 2
1 4
3 9
H a s
a n y o n e
u se
d y o u r
c o m
p u te
r u se
rn a m
e o
r sc
re e n -n
a m
e to
sp re
a d
ru m
o rs
o r
li e s
a b
o u
t a n
o th
e r
p e rs
o n
? 8
1 3
2 4
9 2
8
438 P. M. Moore et al.
123
was correlated with grade (r = -.08, p \ .01), age (r = -.09, p \ .05), parent status (r = -.11, p \ .01), and self-reported grades in school (r = .16, p \ .001). Self satis- faction was correlated with race (r = .24, p \ .001) and self -reported grades in school (r = .13, p \ .001). Finally, school satisfaction was correlated with gender (r = .09, p \ .01), SES (r = .22, p \ .001), and self- reported grades in school (r = .13, p \ .001).
Zero-order correlations among the major variables are presented in Tables 4 and 5.
There were modest, negative correlations between electronic bullying and the global life
satisfaction (r = -.22), and all of the domain-based measures of life satisfaction (ranging from r = -.15 to -.22). There were also modest, negative correlations between victim- ization and global life satisfaction (r = -.11) and all of the domain-based measures of life satisfaction (ranging from r = -.13 to -.18).
Table 3 Descriptive statistics for electronic bullying and victimization
N M SD
Electronic victimization
How often have you electronically bullied someone in the past couple of months? 857 1.22 .65
Have you made fun of someone or teased someone else in a hurtful way…? 856 1.27 .66 Have you told lies or spread rumors about someone else …? 857 1.17 .57 Have you used someone else’s computer username or screen-name to spread rumors or
lies about another person? 856 1.09 .48
Electronic Bullying
How often have you been bullied electronically in the past couple of months? 854 1.35 .85
Has anyone made fun of you or teased you in a hurtful way…? 857 1.35 .83 Has anyone told lies or spread rumors about you…? 857 1.58 1.02 Has anyone used your computer username or screen-name to spread rumors or lies
about another person? 857 1.17 .65
Response options for the EBQ are as follows: 1 = Hasn’t happened; 2 = Once or twice; 3 = 2 or 3 times a month; 4 = Once a week; 5 = Several times a week
Table 4 Correlations among demographic variables, bullying, victimization, and life satisfaction
Bully Victim SLSS Family Friend Living Self School
Grade -.04 -.07* .03 .002 .06 -.08* .01 -.03
Sex .13** .02 -.05 -.02 .16** -.03 .01 .09*
Race -.07 .08* -.02 .04 .02 .05 .24** .22**
SES .06 .07* -.05 -.06 -.05 -.06 .22** .05
Age .04 -.03 -.04 -.05 -.02 -.09** -.004 -.02
Custody .04 .05 -.152** -.093** -.034 -.06 .001 .02
Status .10** .09** -.20** -.15** -.07* -.11** -.04 -.03
Grades -.18** -.23** .29** .20** .11** .16** .13** .13**
Race is coded 1 = Minority Race/Ethnicity and 0 = Caucasian. Sex is coded 0 = Male and 1 = Female. SES is coded 0 = regular lunch and 1 = free or reduced rate lunch. Custody = Parent Custody. Status = Parent Status. Grades = Self reported grades
* p \ .05; ** p \ .01
Electronic Bullying and Life Satisfaction 439
123
Independent-samples t tests were also conducted in order to compare electronic bullying and victimization scores across gender, ethnicity, socioeconomic status, parent custody and
parent marital status (Table 6). Significant differences were found regarding electronic
bullying for gender (males M = 1.28, SD = .61; females M = 1.43, SD = .74; t (849) = -3.26, p \ .01, d = -.22), parent marital status (biological parents married M = 1.32, SD = .66; other marital status M = 1.42, SD = .72; t (842) = -2.15, p \ .01, d = -.14), and parent custody (live with both biological parents M = 1.32, SD = .65; live with other combination of adults M = 1.43, SD = .43; t (849) = -2.21, p \ .05, d = -.20). Significant differences were found regarding electronic victimization for gender
(males M = 1.22, SD = .61; females M = 1.15, SD = .35; t (849) = 1.97, p \ .05, d = -.60), ethnicity (Caucasian M = 1.16, SD = .41; African-American M = 1.24, SD = .58; t (743) = 2.02, p \ .05, d = .17), parent marital status (biological parents married M = 1.14, SD = .40; other marital status M = 1.24, SD = .60; t (843) = -2.96, p \ .01, d = -.20), and parent custody (live with both biological parents M = 1.15, SD = .43; live with other combination of adults M = 1.24, SD = .58; t (850) = -2.45, p \ .01, d = -.18).
Hierarchical multiple regression analyses were used to assess the relationship between
electronic bullying and victimization and life satisfaction, as measured by the MSLSS
domain-based scores and SLSS global score, after controlling for significant demographic
variables. In all, twelve regression analyses were run with electronic bullying and vic-
timization as predictor variables and global and domain-based life satisfaction measure as
criterion variables. After controlling for demographic variables in Step 1 of each of the
analyses, the electronic bullying or victimization scores were entered in Step 2 in order to
determine their unique effects on the criterion variables. The regression models are pre-
sented in Tables 7 and 8. Overall, after controlling for demographic relationships, elec-
tronic bullying related significantly to global life satisfaction (beta = -.14, p \ .001; DR2 = .02), family satisfaction (beta = -.17, p \ .001; DR2 = .03), friend satisfaction (beta = -.19, p \ .001; DR2 = .03), living satisfaction (beta = -.16, p \ .001; DR2 = .02), self satisfaction (beta = -.18, p \ .001; DR2 = .03), and school satisfaction (beta = -.14, p \ .001; DR2 = .02). Also, electronic victimization, related significantly to family satisfaction (beta = -.11, p \ .001; DR2 = .01), friend satisfaction (beta = -.10, p \ .005; DR2 = .01), living satisfaction (beta = -.11, p \ .005; DR2 = .01), self satis- faction (beta = -.17, p \ .001; DR2 = .03), and school satisfaction (beta = -.14, p \ .001; DR2 = .02).
Table 5 Correlations among life satisfaction, bullying, and victimization
Global Family Friend Living Self School Bully Victim
Global –
Family .60* –
Friend .40* .40* –
Living .53* .66* .53* –
Self .47* .55* .67* .56* –
School .43* .58* .46* .51* .58* –
Bully -.22* -.22* -.19* -.19* -.21* -.15* –
Victim -.11* -.15* -.13* -.14* -.18* -.16* .41* –
* p \ .01
440 P. M. Moore et al.
123
4 Discussion
This study explored experiences of electronic bullying and victimization among middle
school students in a suburban USA school. A total of 14% of the students reported
engaging in electronic bullying behaviors, while 20% reported being victims of electronic
bullying. Of more concern is the fact that of those students who reported victimization and
Table 6 Results of T tests and descriptive statistics
Group 95% CI for mean difference t df d
Male Female
M SD n M SD n
Victim 1.22 .61 407 1.15 .35 444 .000–.132 1.97* 849 -.03
Bully 1.28 .61 408 1.43 .74 443 -.001–.134 -3.25** 849 -.22
Caucasian Minority 95% CI for mean difference t df d
M SD n M SD n
Victim 1.16 .415 505 1.24 .578 240 .011–.157 2.27* 743 .17
Bully 1.37 .680 505 1.31 .626 239 -.161–.043 -1.13 742 -.09
7th Grade 8th Grade 95% CI for mean difference t df d
M SD n M SD n
Victim 1.21 .54 441 1.15 .44 410 .000–.127 1.80 849 .12
Bully 1.39 .72 441 1.33 .65 410 -.034–.149 1.23 849 .08
FRL No FRL 95% CI for mean difference t df d
M SD n M SD n
Victim 1.23 .61 184 1.17 .46 656 -.151–.010 -1.72 838 -.13
Bully 1.39 .64 183 1.35 .70 656 -.148–.072 -.623 837 -.05
Custody both Custody other 95% CI for mean difference t df d
M SD n M SD n
Victim 1.15 .43 533 1.24 .58 319 -.154–.017 -2.45** 850 -.18
Bully 1.32 .65 532 1.43 .43 319 -.203–.012 -2.21* 849 -.20
Bio married Other status 95% CI for mean difference t df d
M SD n M SD n
Victim 1.14 .40 500 1.24 .60 345 -.174–.029 -2.96** 843 -.20
Bully 1.32 .66 498 1.42 .72 346 -.198–.009 -2.15* 842 -.14
Race is coded 1 = Minority Race/Ethnicity and 0 = Caucasian. Sex is coded 0 = Male and 1 = Female. SES is coded 0 = regular lunch and 1 = free or reduced rate lunch. Custody is coded as 0 = live with both biological parents and 1 = other combination of adults. Status is coded as 0 = Married and 1 = Other status
* p \ .05; ** p \ .01
Electronic Bullying and Life Satisfaction 441
123
Table 7 Summary of regression analyses with predictor variable electronic bullying
B SEB b DR2 DF
Family satisfaction
Demographics .23 .04 .19 .07 8.16*
Demographics & victimization -.31 .06 -.17 .03 25.03*
Friend satisfaction
Demographics .06 .03 .07 .04 5.27*
Demographics & victimization -.24 .04 -.19 .03 30.00*
Living satisfaction
Demographics .18 .04 .14 .05 6.33*
Demographics & victimization -.27 .06 -.15 .02 19.43*
Self satisfaction
Demographics .12 .03 .14 .06 7.48*
Demographics & victimization -.23 .04 -.18 .03 26.70*
School Satisfaction
Demographics .17 .05 .13 .07 9.07*
Demographics & victimization -.26 .06 -.14 .02 15.84*
Global life satisfaction (SLSS)
Demographics .28 .04 .26 .13 16.19*
Demographics & victimization -.22 .05 -.144 .02 17.51*
* p \ .01
Table 8 Summary of regression analyses with predictor variable electronic victimization
B SEB b DR2 DF
Family satisfaction
Demographics .23 .04 .18 .07 8.14*
Demographics & victimization -.28 .09 -.11 .01 10.52*
Friend satisfaction
Demographics .06 .03 .07 .04 5.25*
Demographics & victimization -.18 .06 -.10 .01 8.11*
Living satisfaction
Demographics .18 .04 .14 .05 6.32*
Demographics & victimization -.27 .09 -.11 .01 9.53*
Self satisfaction
Demographics .12 .03 .14 .06 7.52*
Demographics & victimization -.30 .06 -.17 .03 22.95*
School satisfaction
Demographics .17 .05 .13 .07 9.13*
Demographics & victimization -.37 .09 -.14 .02 16.19*
Global life satisfaction (SLSS)
Demographics .28 .04 .26 .13 16.21*
Demographics & victimization -.08 .07 -.04 .001 1.17
* p \ .01
442 P. M. Moore et al.
123
bullying, 3% of students reported being victims of electronic bullying several times a week
while 1.4% reported engaging in electronic bullying several times a week, indicating that a
small portion of students engage in or suffer from chronic forms of electronic bullying.
Electronic bullying displayed statistically significant associations with student gender,
parent marital status, and self-reported grades in school. Electronic victimization showed
statistically significant associations with student ethnicity, grade level, SES, parent marital
status, and self-reported grades in school. Furthermore, students who did not live with both
biological parents were more likely to be both victims and perpetrators of electronic
bullying compared to students living with both biological parents. Similarly, students
whose biological parents were not married were more likely to be both victims and per-
petrators as compared to students whose biological parents were married. These differ-
ences suggest that both bullies and victims may be more likely to come from non-intact
family situations as compared to their peers.
Student gender also related significantly to experiences of electronic bullying and vic-
timization. In this sample, female students were more likely to engage in electronic bul-
lying, and females and minority students were more likely to be victims. These results were
not necessarily expected as previous studies have suggested that females are more likely to
be victims of electronic bullying whereas males are more likely to be aggressors (Kowalski
and Limber 2007; Wang et al. 2009). However, girls outnumbered boys (446–409) in this
sample, possibly accounting for the differences among studies. It may also be important to
consider that in regard to traditional bullying, girls tend to utilize relational aggressive acts
more than boys (Crick and Bigbee 1998; Crick and Grotpeter 1995; French et al. 2002).
Similarly, contrary to the findings of this study, previous research has suggested that
minority students are more often involved in electronic bullying behaviors as aggressors
rather than as victims (Wang et al. 2009). Thus, although generalizable demographic dif-
ferences may emerge as more research findings appear in the literature, it does appear safe to
conclude that individuals can be subjected to and engage in electronic bullying regardless of
age, gender, ethnicity, academic performance, and SES (Aricak et al. 2008).
The differences in the findings of studies of the experiences of early adolescents with
electronic bullying and victimization merit further consideration. The differences may be
due to various issues related to the novelty of the research area. These issues include
differences across studies in terms of the definitions of bullying and victimization, samples,
and measures. For example, little information is available regarding the psychometric
properties of the existing measures of electronic bullying and victimization. Because of the
unknown validity of the measures, students who have may been exposed to electronic
bullying may not recognize it as such due to how and what is being asked of them. These
students may not recognize that what they have experienced is, in fact, a form of bullying
(Aricak et al. 2008; Kowalski and Limber 2007). For another example, differences in the
age levels of student samples are likely important. As children progress through school,
their access to and use of electronic technologies and social networking cites is likely to
increase, which may in turn result in an increase in electronic bullying (Kowalski and
Limber 2007). Finally, differences in the modalities associated with electronic bullying are
likely critical to understand. Although the original questionnaire used in this research study
asked about bullying modalities (i.e., cell phone, emails, social network sites), these
questions had to be removed because of space and time limitations. Variation may occur
due to differences in access and therefore exposure to the type of bullying that occurs. For
example, many schools and public libraries in the USA now have computers available to
students, which may account for an increase in electronic bullying due to computer use as
compared to more personal, costly devices such as cell phones.
Electronic Bullying and Life Satisfaction 443
123
This study also investigated the relationship between electronic bullying and victim-
ization and adolescents’ reports of global and domain-specific life satisfaction (family,
school, friends, self, and living environment). The findings revealed modest, negative
correlations between electronic bullying and victimization and global life satisfaction and
satisfaction with family, friends, living environment, self, and school. Thus, the presumed
effects of electronic bullying and victimization although modest, appear quite pervasive,
occurring across multiple important life domains.
In general, these results are consistent with traditional bullying and life satisfaction
research, which indicates that students who report being bullies and victims of traditional
bullying have lower levels of life satisfaction compared to their peers (Flaspohler et al.
2009). Specifically, research examining on-line harassment suggests that those with lower
levels of self-esteem are more likely to respond maladaptively compared to their non -
victimized peers (Hinduja and Patchin 2007b). Similarly, research has found that both
overt victimization and relational victimization experiences correlate with reduced levels
of life satisfaction (Martin and Huebner 2007). In contrast, students who report higher
levels of life satisfaction tend to report better interpersonal, intrapersonal, and academic
outcomes. Youth who report higher levels of life satisfaction also report higher levels of
personal control, self-esteem, extraversion, hope, self-efficacy, and interpersonal skills.
These youth also report higher school grades, better peer relationships, and more positive
school experiences (Gilman and Huebner 2006; Suldo and Huebner 2006).
After controlling for significant demographic relationships, the results of the hierar-
chical multiple regression analyses, controlling for significant demographic relationships,
revealed comparable findings to those based on the zero-order correlations, with one
exception. With demographic variables were controlled, the relationship between elec-
tronic victimization and global life satisfaction became non-significant whereas relation-
ships with the domain-based measures remained significant. This finding suggests the
possibility that global measures of life satisfaction may mask important relationships on
occasion. The finding of the non-significant relationship with overall life satisfaction is
consistent with the previously mentioned study by Antaramian et al. (2008), in which
differences in family structure (i.e., intact vs. non-intact) related significantly to satisfac-
tion with family life, but not with overall life satisfaction. Thus, further research is needed
to determine the relative sensitivity of global and domain-based life satisfaction measures
in various contexts. Future research should also explore whether or not the modest rela-
tionships with the various life satisfaction reports generalize across different samples of
adolescents or whether there are potential moderators of the relationships (e.g., differences
in social support), such that some students experience more detrimental consequences that
others from this new form of bullying. For example, Flaspohler et al. (2009) found that the
relationships between victimization and life satisfaction were stronger for students with
low social support from peers and teachers.
Overall, this study has several major limitations. First, data were obtained from students
from a Southeastern USA middle school with characteristics that were not representative of
the USA as whole, which may limit the generalizability of the findings. More research is
needed in order to investigate the relationship between electronic bullying and life satis-
faction with more representative samples of students as well as with students from other
age ranges. Another limitation of this study was the cross-sectional design, which cannot
shed light on the directionality of the relationships between electronic bullying and life
satisfaction. Longitudinal analyses are needed to clarify the directionality of the rela-
tionships, including the possibility of bidirectional relationships.
444 P. M. Moore et al.
123
The findings of this exploratory research study have important implications for not only
youth engaging in and victimized by electronic bullying, but also for parents and human
services professionals alike. As previously discussed, bullying from peers has been iden-
tified as one of the most problematic behavioral concerns among adolescents (Boulton
1999; Boulton et al. 2008; Hawker and Boulton 2000). With the high prevalence rates of
electronic bullying and victimization, such experiences have become a global phenome-
non, meriting considerable concern (Aricak et al. 2008; Kowalski and Limber 2007;
Willard 2006). Given that a majority of students report that electronic bullying is most
likely to start at school and continue at home, it is important for parents and school and
community professionals to take such behavior seriously and educate themselves about its
nature, frequency, and correlates (Cassidy et al. 2009; Kowalski et al. 2008). Furthermore,
it is critical that preventative and palliative strategies are developed to address concerns
related to electronic bullying and victimization. The available evidence suggests that
electronic bullying and victimization are related to lower subjective well-being, in the form
of reduced life satisfaction, for both parties. As technology continues to progress, it is
likely that adolescents’ use of electronic communication technologies will increase,
therefore, continued research is critical to understand this new form of bullying and its
consequences.
References
Antaramian, S., Huebner, E. S., & Valois, R. (2008). Adolescent life satisfaction. Applied Psychology: An International Review, 57, 112–126.
Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N., et al. (2008). Cyberbullying among Turkish adolescents. CyberPsychology and Behavior, 11, 253–261.
Batsche, G., & Knoff, H. (1994). Bullies and their victims: Understanding a pervasive problem in the schools. School Psychology Review, 23, 165–174.
Beran, T., & Li, Q. (2005). Cyber-harassment: A new method for an old behavior. Journal of Educational Computing Research, 41, 137–153.
Berson, I., & Berson, M. (2005). Challenging online behaviors of youth. Social Science Computer Review, 23, 29–38.
Boulton, M. (1999). Concurrent and longitudinal relations between children’s playground behavior and social preference, victimization, and bullying. Child Development, 70, 944–954.
Boulton, M., Trueman, M., & Murray, L. (2008). Associations between peer victimization, fear of future victimization and disrupted concentration on class work among junior school pupils. British Journal of Education and Psychology, 78, 473–489.
Brown, K., Jackson, M., & Cassidy, W. (2006). Cyber-bullying: Developing policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educa- tional Administration and Policy, 57(1), 1–36.
Buhi, E. R., Goodson, P., & Neilands, T. B. (2008). Out of sight, not out of mind: Strategies of handling missing data. American Journal of Health Behavior, 32, 83–92.
Cassidy, W., Jackson, M., & Brown, K. (2009). Sticks and stones can break my bones, but how can pixels hurt me?: Students’ experiences with cyber-bullying. School Psychology International, 30, 383–402.
Cohen, J., Cohen, P., West, S. G., & Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioral sciences (3rd ed.). Mahwah, NJ: Erlbaum.
Cook, C. R., Williams, K. R., Guerra, N. G., & Tuthill L. (2007). Cyberbullying: What it is and what we can do about it? NASP Communiqué, 36(1), 4–5.
Crick, N., & Bigbee, M. (1998). Relational and overt forms of peer victimization: A multi informant approach. Journal of Consulting and Clinical Psychology, 66, 337–347.
Crick, N. R., & Grotpeter, J. K. (1995). Relational aggression, gender, and social-psychological adjustment. Child Development, 66, 710–722.
David-Ferdon, C., & Hertz, M. (2007). Electronic media, violence, and adolescents: An emerging public health problem. Journal of Adolescent Health, 41, S1–S5.
Electronic Bullying and Life Satisfaction 445
123
DeBell, M., & Chapman, C. (2003). Computer and internet use by children and adolescents in the United States, 2001 (NCES 2004–014). U.S. Department of Education. Washington, DC: National Center for Education Statistics.
Dew, T., & Huebner, E. S. (1994). Adolescents’ perceived quality of life: An exploratory investigation. Journal of School Psychology, 32, 185–199.
Diener, E. (1984). Subjective well-being. Psychological Bulletin, 95, 542–575. Fight Crime: Invest in Kids. (2006). One of three teens and one of six preteens are victims of cyber bullying
[Data file]. Retrieved from http://www.fightcrime.org/state/pennsylvania/news/1-3-teens-1-6-preteens- are-victims-cyber-bullying.
Flaspohler, P. D., Elfstrom, J. L., Vanderzee, K. L., Sink, H. E., & Birchmeier, Z. (2009). Stand by me: The effects of peer and teacher support in mitigating the impact of bullying on quality of life. Psychology in the Schools, 46, 636–649.
French, D., Jansen, E., & Pidada, S. (2002). United States and Indonesian children’s and adolescents’ reports of relational aggression by disliked peers. Child Development, 73, 1143–1150.
Gilman, R., & Huebner, E. S. (2006). Characteristics of adolescents who report very high life satisfaction. Journal of Youth and Adolescence, 35, 311–319.
Gilman, R., Huebner, E. S., & Laughlin, J. (2000). A first study of the multidimensional students’ life satisfaction scale with adolescents. Social Indicators Research, 52, 135–160.
Hawker, D., & Boulton, M. (2000). Twenty years’ research on peer victimization and psychosocial mal- adjustment: A meta-analytic review of cross-sectional studies. Journal of Child Psychology and Psychiatry, 41, 441–455.
Hinduja, S., & Patchin, J. (2007a). Cyberbullying victim and offender warning signs. Cyberbullying Research Center. Retrieved from http://www.cyberbullying.us/cyberbullyingwarningsigns.pdf.
Hinduja, S., & Patchin, J. (2007b). Cyberbullying victimization and self-esteem. In Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott Marquis, Atlanta, Georgia. 2010-06-07 from http://www.allacademic.com/meta/p201344_index.html.
Hinduja, S., & Patchin, J. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 129–156.
Huebner, E. S. (1991). Initial development of the students’ life satisfaction scale. School Psychology International, 12, 231–240.
Huebner, E. S. (1994). Preliminary development and validation of a multidimensional life satisfaction scale for children. Psychological Assessment, 6, 149–158.
Huebner, E. S., Laughlin, J., Ash, C., & Gilman, R. (1998). Further validation of the multidimensional students’ life satisfaction scale. Journal of Psychoeducational Assessment, 16, 118–134.
Juvonen, J., Graham, S., & Schuster, M. (2003). Bullying among young adolescents: The strong, the weak, and the troubled. Pediatrics, 112, 1231–1237.
Juvonen, J., & Gross, E. (2008). Extending the school grounds? Bullying experiences in cyberspace. Journal of School Health, 78, 496–505.
Kowalski, R., & Limber, S. (2007). Electronic bullying among middle school students. Journal of Ado- lescent Health, 41, S22–S30.
Kowalski, R., Limber, S., & Agaston, P. (2008). Cyber bullying: Bullying in the digital age. Victoria: Blackwell Publishing.
Lenhart, A., Madden, M., & Hitlin, P. (2005). Teens and technology: Youth are leading the transition to a fully wired and mobile nation. Pew Internet and American Life Project. Retrieved from http://pweinternet.org/pdfs/PIP_teens_Tech_July2005.web.pdf.
Martin, K., & Huebner, S. (2007). Peer victimization and prosocial experiences and emotional well-being of middle school students. Psychology in the Schools, 44, 199–208.
Nansel, T. R., Overpeck, M., Pilla, R. S., Ruan, W. J., Simons-Morton, B., & Scheidt, P. (2001). Bullying behaviors among US youth: Prevalence and association with psychosocial adjustment. Journal of the American Medical Association, 285, 2094–2100.
Olweus, D. (1993). Bullying at school: What we know and what we can do. Cambridge, MA: Blackwell. Olweus, D. (1994). Bullying at school: Basic facts and effects of a school based intervention program.
Journal of Child Psychology and Psychiatry, 35, 1171–1190. Olweus, D. (1996). The revised Olweus bully/victim questionnaire. Norway: University of Bergen. Patchin, J., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying.
Youth Violence and Juvenile Justice, 4, 148–169. Raskauskas, J., & Stoltz, A. (2007). Involvement in traditional and electronic bullying among adolescents.
Developmental Psychology, 43, 564–575. Solberg, M., & Olweus, D. (2003). Prevalence estimation of school bullying with the Olweus bully/victim
questionnaire. Aggressive Behavior, 29, 239–268.
446 P. M. Moore et al.
123
Suldo, S. M., & Huebner, E. S. (2006). Is extremely high life satisfaction during adolescence advantageous? Social Indicators Research, 78, 179–203.
Vossekuil, B., Fein, R., Reddy, M., Borum, R., & Modzelesku, W. (2002). The final report and findings of the safe school initiative: Implications for the preventions of school attacks in the United States. Washington, DC: U.S. Secret Service and U.S. Department of Education.
Wang, J., Iannotti, R., & Nansel, T. (2009). School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45, 368–375.
Willard, N. (2003). Off-campus, harmful online student speech. Journal of School Violence, 1, 65–93. Willard, N. (2006). Flame retardant. School Library Journal, 52, 55–56. Williams, K., & Guerra, N. (2007). Prevalence and predictors of internet bullying. Journal of Adolescent
Health, 41, S14–S21. Willkins-Shurmer, A., O’Callaghan, M., Najman, J., Bor, W., Williams, G., & Anderson, M. (2003).
Association of bullying with adolescent health-related quality of life. Journal of Pediatric Child Health, 39, 436–441.
Wolak, J., Mitchell, K., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online only contacts. Journal of Adolescent Health, 41, S51– S58.
Ybarra, M., Espelage, D., & Mitchell, K. (2007a). The co-occurrence of online verbal aggression and sexual solicitation victimization and perpetration: Association with psychosocial indicators. Journal of Adolescent Health, 41, S31–S41.
Ybarra, M., & Mitchell, K. (2004a). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45, 1308–1316.
Ybarra, M., & Mitchell, K. (2004b). Youth engaging in online harassment: associations with caregiver-child relationships, Internet use, and personal characteristics. Journal of Adolescence, 27, 319–336.
Ybarra, M., West, M., & Leaf, P. (2007b). Examining the overlap in internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health, 41, S42–S50.
Electronic Bullying and Life Satisfaction 447
123
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
- c.11205_2011_Article_9856.pdf
- Electronic Bullying and Victimization and Life Satisfaction in Middle School Students
- Abstract
- Introduction
- Aims of the Current Study
- Method
- Participants
- Measures
- Electronic Bullying and Victimization
- Multidimensional Students’ Life Satisfaction Scale
- Students’ Life Satisfaction Scale
- Procedures
- Data Analysis
- Results
- Discussion
- References

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com