No abstract
This study examined factors that increase or decrease the support a bystander offered to a victim of cyberbullying. Possible determinants of supportive behaviour were analyzed using a four‐step hierarchical regression analysis on data from 156 Czech children (12–18 years old; M = 15.1; 54% females) who witnessed their schoolmates being victims of cyberbullying. Among individual characteristics, only a general tendency toward prosocial behaviour was a positive predictor of supportive behaviour. Other factors such as age, gender, self‐esteem, and problematic relationships with peers had no effect. Among contextual factors, existing relationships with the victim, upset feelings evoked by witnessing victimization, and direct requests for help from the victim triggered supportive behaviour, while strong relationships with the bully inhibited it. Fear of intervening played no role. The practical implications of the findings are discussed with regard to the roles of the emotional response of the bystander and direct requests for help from the victim in cyberbullying interventions. Copyright © 2012 John Wiley & Sons, Ltd.
Random samples of at least 1,000 youth, ages 9 to 16 years, from 25 European countries (N ¼ 25,142) were used to test the salience of low self-control on cyberbullying perpetration and victimization (direct and indirect effects), framed by a cross-cultural developmental approach. Path models, which provided evidence of invariance by sex, tested the hypothesized links among low self-control as well as known correlates, including offline perpetration and victimization, and externalizing behaviours. Results showed positive associations between online and offline bullying behaviours (perpetration and victimization), and, more interestingly, both direct but mostly indirect effects by low self-control on cyberbullying perpetration and victimization; externalizing behaviours had little additional explanatory power. Importantly, multi-group tests by country samples provided evidence of quite modest differences in the tested links across the 25 developmental contexts, despite Correspondence should be addressed to Alexander T. Vazsonyi,
Cyberbullying often takes place with the virtual presence or knowledge of bystanders. While we have some evidence about the determinants of bystanders' responses to offline bullying, we lack empirical studies concerning the variables that influence bystanders' responses to cyberbullying. The current study examines bystanders' responses to offline bullying and cyberbullying incidents. Two types of responses were captured: support toward the victims and the reinforcement of bullies' actions. Using data from 321 German adolescents (ages 12-18; M = 14.99; 44% girls), the association between bystanders' responses and normative beliefs about verbal aggression and cyberaggression, and affective and cognitive empathy, were tested in a path model. Both types of normative beliefs positively predicted the reinforcement of bullies, and normative belief about verbal aggression also predicted support for the victims of offline bullying. Both types of empathy predicted support in offline bullying, but only affective empathy predicted support in cyberbullying. There was no link between affective or cognitive empathy to the reinforcement of bullies. Moreover, bystanders' tendencies to respond supportively to the victim or to reinforce the bully were rather consistent in both cyber- and offline bullying, but there was no link between support and reinforcement. The findings are discussed with regard to implications for prevention and intervention efforts.
Although cyberbullying is a well-studied online risk, little is known about the effectiveness of various coping strategies for its victims. Therefore, this study on 2,092 Czech children aged 12-18 examined which coping strategies were applied most often and to what extent victims of cyber aggression judged them to be effective. Effectiveness was measured in two ways: the extent to which the coping strategy buffered negative emotions, and the extent to which it stopped the cyber aggression. The subsample of 422 respondents (68% girls) who experienced online attacks was divided into two groups: victims of cyberbullying, who experienced long-term and severe victimization, and victims of less severe online harassment. The selection of strategies was compared between these groups and the most prevalent and effective strategies were identified. Overall, respondents in both groups used more than one strategy at once, but for victims of cyberbullying, most of the strategies proved less effective. Both groups showed similar patterns in their use of technical solutions, and both quite frequently sought social support. Also, both groups showed a low tendency for retaliation. Large differences were found in how respondents employed cognitive responses, such as trying to detach mentally from bullying incidents; these strategies were less frequent among victims of cyberbullying. In terms of effectiveness, victims of harassment considered technical solutions such as blocking contacts on social websites, seeking support, or ignoring the bully on purpose the most effective in stopping victimization, as opposed to victims of cyberbullying, who found them less effective, even though they used them as frequently as victims of online harassment. Differences in the effectiveness of coping strategies are discussed with regard to the intervention and prevention of cyberbullying.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.