2021
DOI: 10.1007/s40806-021-00297-7
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary Functions of Cyber and Traditional Forms of Aggression in Adolescence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(12 citation statements)
references
References 90 publications
1
11
0
Order By: Relevance
“…As hypothesized, reactive functions were positively associated with anonymous aggression in relational but not cyber form. Although adolescents are motivated to cyber aggress in retaliation for real or perceived threats (Hamm et al, 2015; Lapierre & Dane, 2021; Varjas et al, 2010; Ybarra & Mitchell, 2007), this research suggests that anonymous cyber aggression is less likely to be used to achieve such functions. This is probably because it requires technical preparation or opportunities for hacking or impersonation that impose practical constraints on its use in an impulsive and unplanned manner.…”
Section: Discussionmentioning
confidence: 85%
See 4 more Smart Citations
“…As hypothesized, reactive functions were positively associated with anonymous aggression in relational but not cyber form. Although adolescents are motivated to cyber aggress in retaliation for real or perceived threats (Hamm et al, 2015; Lapierre & Dane, 2021; Varjas et al, 2010; Ybarra & Mitchell, 2007), this research suggests that anonymous cyber aggression is less likely to be used to achieve such functions. This is probably because it requires technical preparation or opportunities for hacking or impersonation that impose practical constraints on its use in an impulsive and unplanned manner.…”
Section: Discussionmentioning
confidence: 85%
“…To assess victimization, adolescents were asked how often they had experienced bullying victimization (“In the past few months, how often have the following things been done to you by someone who was more popular or strong than you?”), and adversarial victimization (“In the past few months, how often have the following things been done to you by someone who was equally or less popular or strong than you?”). To answer each of these questions, the participants rated several items that described experiences of victimization along a 5-point Likert-type scale ranging from 1 = never to 5 = very often (Lapierre & Dane, 2020b, 2021; Volk et al, 2022) within relational (four items; e.g., “Others left me out or excluded me from a group activity”; Bullying victimization: α = .88; Adversarial victimization: α = .86), and cyber (five items; “Others spread negative rumours or gossip about me, using the Internet or a cell phone”; Bullying victimization: α = .85; Adversarial victimization: α = .87) forms.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations