Академический Документы
Профессиональный Документы
Культура Документы
a r t i c l e
i n f o
Article history:
Received 18 September 2012
Received in revised form 22 March 2013
Accepted 15 April 2013
Available online 30 May 2013
Keywords:
Cyberbullying
Experiment
Power imbalance
Media
Vignettes
a b s t r a c t
Cyberbullying is a prevalent problem of adolescents. However, several conceptual and measurement questions, regarding its dening characteristics and relevant dimensions in comparison to conventional bullying,
remain unanswered. To this end we conducted two studies with experimental methods. Study I shows that
power imbalance in terms of perceived popularity is relevant for the affective, cognitive, and behavioral experience of cyberbullying. Cyberbullying by a popular bully is more distressing than cyberbullying by an unpopular bully. Study II shows that factors unique to cyberbullying are also relevant for the experience of
cyberbullying, namely the media and the type of cyberbullying. For example, different types of cyberbullying
are related to different patterns of relevant coping strategies. Therefore, cyberbullying seems both a unique
phenomenon and closely related to conventional bullying.
2013 Elsevier Inc. All rights reserved.
Numerous studies have demonstrated that cyberbullying has become an important cross-national phenomenon with an estimated
prevalence between 20 and 40% among adolescents (Tokunaga,
2010). In Germany, empirical studies have found cyber-victim prevalence to be between 3 and 36% and cyber-perpetrator prevalence between 5 and 42% (Katzer, Fetchenhauer, & Belschak, 2009a,b; Pieschl
& Porsch, 2012; Riebel, Jger, & Fischer, 2009; Schultze-Krumbholz &
Scheithauer, 2009; Staude-Mller, Bliesener, & Nowak, 2009; Wachs
& Wolf, 2011). A similar variance can be found internationally. Part
of this variance between the ndings can be attributed to methodology (Menesini & Nocentini, 2009): Self-reported prevalence is generally lower if adolescents have to report their experience regarding a
short period of time (vs. their lifetime) and if it is measured with a
single item directly referring to cyberbullying (vs. multiple behavioral
items).
However, we argue that this apparent methodological problem is
confounded with and based on a deeper conceptual problem. The adequate conceptualization and denition of cyberbullying are still
highly discussed because the exact composition of the construct of
Corresponding author. Tel.: +49 2518331386; fax: +49 2518339105.
E-mail addresses: pieschl@uni-muenster.de (S. Pieschl), t.porsch@uni-muenster.de
(T. Porsch), kahl@uni-bielefeld.de (T. Kahl), rahel.klockenbusch@uni-muenster.de
(R. Klockenbusch).
1
Now at the LAFP (Landesamt fr Ausbildung, Fortbildung und Personalangelegenheiten
[Federal Bureau of Education and Human Resources]) of the Police in North-Rheine
Westphalia, Germany.
2
Now a student at the Faculty of Psychology, Universitt Bielefeld, Germany.
3
Now a student at Institut fr Psychologie, Albert-Ludwigs-Universitt Freiburg,
Germany.
0193-3973/$ see front matter 2013 Elsevier Inc. All rights reserved.
http://dx.doi.org/10.1016/j.appdev.2013.04.002
242
found most cyber-bullies used phone calls; Slonje and Smith (2008)
found most cyber-bullies used emails. Additionally, Smith and colleagues demonstrated that adolescents consider cyberbullying by
photo or video clips to be more distressing than conventional bullying,
cyberbullying by phone calls as distressing as conventional bullying,
and cyberbullying by all other media less distressing than conventional
bullying (Slonje & Smith, 2008; Smith et al., 2008).
Recently it has been criticized that this kind of categorization
might have become obsolete because the recent advent of the smart
phones has caused different kinds of media to converge; media cannot be clearly distinguished anymore (Ortega, Mora-Merchn, &
Jger, 2007). We would like to point out that even though the hardware and technical applications converge other aspects of media do
not. More specically, we propose that one relevant dimension for
explaining these effects (Slonje & Smith, 2008; Smith et al., 2008) is
the representational code rather than the software applications: Verbal (written or spoken text) and visual codes (pictures and videos)
are assumed to be processed differently (Paivio, 1986) and presumably have different effects on the experience of cyberbullying.
Another suggested categorization, unique to cyberbullying, was
derived from theoretical considerations. Conventional bullying is
often subdivided into verbal, physical, and relational bullying
(Scheithauer et al., 2007). For cyberbullying, Willard (2007) proposed
eight types of cyberbullying activities and other forms of online
social cruelty (p. 5). We consider ve of these to be cyberbullying:
harassment (insults or threats against the cyber-victim), denigration (spreading damaging rumors to harm the cyber-victim's
reputation), impersonation (assuming a fake identity to impersonate
the cyber-victim and behaving in an embarrassing or damaging way),
outing and trickery (gaining and then violating the trust of the
cyber-victim by publicly announcing private and embarrassing secrets,
for example via photos or videos), and exclusion (systematically excluding the cyber-victim from online activities or online groups). We
have excluded the other categories of Willard's (2007) taxonomy
from our conceptualization of cyberbullying because they concern arguments between equally powerful peers (aming), because we view
them as being sub-categories of harassment (cyberthreats), or because we consider them more closely related to sexual harassment on
the internet than to cyberbullying (cyberstalking).
In Germany, a cyberbullying questionnaire (and adaptations) was
developed based on this taxonomy (Pieschl & Porsch, 2012; Riebel et
al., 2009; Wachs & Wolf, 2011). In these empirical studies, denigration and harassment were reported most frequently whereas impersonation, outing and exclusion were rarely reported by adolescents.
However, the differential effects of these types of cyberbullying remain unexplored.
We empirically investigate some of these uniquely cyber-specic aspects of cyberbullying in Study II. More specically, we attempt to replicate the media effects that Smith and colleagues detected (Slonje &
Smith, 2008; Smith et al., 2008) in a more experimental setting by comparing video-based and text-based incidents. Additionally, we explore
the differential effects of different types of cyberbullying proposed by
Willard (2007) by comparing the frequent type of harassment with
the rare type of outing.
Methodological framework
So far, cyberbullying research has used either qualitative methods
such as focus groups and interviews of adolescents (Vandebosch &
Van Cleemput, 2008) or quantitative survey methods (Menesini &
Nocentini, 2009). These methods are well-suited to gather deep insights into adolescents' perspective on cyberbullying as well as representative data on the prevalence of cyberbullying and the relation
between cyberbullying and potential risk and protective factors.
However, these methods do not allow for conclusions about the
243
causality. Therefore, we chose a more experimental approach to directly address the conceptual issues of interest.
We presented adolescents with hypothetical cyber incident
vignettes. These scenarios were systematically manipulated to adhere
to the experimental factors of interest. Vignettes in general are a valuable research tool because they allow collecting data on how people
would act in situations that cannot be investigated with other methodologies because of their sensitive nature or their infrequent occurrence (Collett & Childs, 2011; LaFontana & Cillessen, 2010). However,
the validity of this approach is a crucial issue: It has been shown that
the emotional experience of real situations manipulated in the lab is
more intense than reading hypothetical vignettes (Collett & Childs,
2011). These ndings point to the general validity of this approach
with regard to the type of effects but also to a potentially reduced
size of effects. For cyberbullying, vignettes are a promising methodology to experimentally manipulate cyberbullying incidents, avoiding
many of the methodological and ethical challenges of re-creating
cyberbullying in the laboratory.
Additionally, research on conventional bullying also successfully
utilized vignettes for exploring conceptual questions. For example,
vignettes have been used to explore children's views about their
emotions (and their parents' reactions) as results of being a hypothetical bully (Tto & Farrington, 2008), parents' responses to hypothetical children's victimization events (Bonnet, Goossens, & Schuengel,
2011), and teachers' attitudes towards different kinds of bullying incidents (Bauman & Del Rio, 2006; Yoon, 2004).
Our experimental approach can be interpreted within the framework of the General Aggression Model (GAM; Carnagey & Anderson,
2003) which is often used to explain effects of violent media consumption. The GAM assumes that the reaction to a specic incident
depends on personal and situational characteristics as inputs. We systematically varied the situational characteristics via the vignette
methodology. Additionally, we captured selected personal characteristics such as adolescents' age, sex, media use, and cyber(bullying) experiences. These inputs are assumed to be processed via three
interrelated routes, namely cognition, affect, and physiological arousal which describe the current internal state of a person. Therefore, we
selected our dependent variables accordingly: We captured affect via
the Current Mood Scale (Dalbert, 1992); in Study I we also captured
cognition via the Helpless Cognition Scale (Breitkopf, 1985). We did
not measure physiological arousal. After appraisal this internal personal
state is assumed to translate into action. To capture this behavioral
facet, we asked adolescents about their intended coping strategies
(Coping Strategies Question(naire)).
Study I: Is power imbalance relevant to cyberbullying?
Power imbalance has many facets; one of them is the social status
of the perpetrator in terms of perceived popularity. We explored the
difference between cyber incidents caused by a popular versus an unpopular bully in an online eld experiment with a within-subject design. The following hypotheses and exploratory research questions
were analyzed. Hypothesis 1: The Social Status of the cyber-bully
has effects. Cyber-victims' affect (mood), cognitions (helplessness),
and behavior (coping strategies) differ between being harassed by a
popular cyber-bully and being harassed by an unpopular cyber-bully;
being harassed by a popular cyber-bully is more distressing. Hypothesis
2: The difference between being harassed by a popular or unpopular
cyber-bully is not independent from the Order of cyber incidents. By
being repeatedly confronted with negative cyber experiences, cybervictims become desensitized. The rst experience is more distressing
than the second. Exploratory Research Question 3: Does the experience
of cyber incidents vary according to personal characteristics, specically
the sex, age, perceived popularity, and cyberbullying experience of the
cyber-victim, the degree of liking between the cyber-victim and the ctitious cyber-bully, and the sex of the ctitious cyber-bully?
244
Method
Procedure
All students were confronted with two cyber scenarios in a
two-by-two design. The Social Status of the cyber-bully in terms of
perceived popularity was one within-subject factor. In one experimental condition a mean cyberbullying message was supposedly
written by the most popular classmate (Bully+) in the other condition the entry was supposedly written by the most unpopular classmate (Bully) of the students. The order of presentation was varied
randomly in two between-subject conditions. Students in Group A
(+/) received the Bully + scenario rst, followed by the Bully
scenario whereas students in Group B (/+) received the Bully
scenario rst, followed by the Bully + scenario. For each scenario students answered several questionnaires: the Current Mood Scale, the
Helpless Cognition Scale, and the Coping Strategies Question. Afterwards they answered the Cyber Experience Questionnaire. On average
students needed 18 min to complete these tasks.
This study was conducted online; students could ll in the
web-based questionnaires any time they wanted to. All students participated voluntarily and gave their informed consent. Among all participants six Amazon vouchers were rafed off as an incentive. At the
end of the questionnaire it was explicitly pointed out that this was a
ctitious experiment, we gave contact information for further questions, and all participants were informed of the results if they wished.
Participants
We recruited a voluntary online convenience sample of students
between the ages of 12 to 19 through email and social network sites
such as Facebook and schlerVZ (a German online social network).
In total 465 participants started to answer the online questionnaires.
However, 184 students only answered part of the questionnaires, 76
students were faster than 8 min which seemed unreasonable given
the length of the questionnaires. Twelve students displayed no variance in their answers between the rst and the second scenario
even though the scales were reverse-coded which indicates that
they did not seriously answer the questionnaires both times, and
the open answers of 7 students indicated that they did not understand the instructions. Therefore, all the data of these students were
excluded from further analyses and the nal sample consists of
n = 186 students.
These 56 boys and 130 girls were between 12 and 19 years old
(M = 15.88, SD = 2.06) and on average attended 10th grade
(M = 9.88, SD = 2.16). Within the three-tier German school system,
the majority (n = 128; 69 %) attended the highest track, 19 students
(10 %) attended the middle track, and 3 students (2 %) attended the
lowest track. Furthermore, 18 students (10 %) attended a comprehensive school that combines all tracks, 9 students (5 %) attended vocational school, and 9 students (5 %) indicated other types of education. On
average students considered themselves fairly popular (M = 2.31,
SD = .84; on a scale from 1 = almost nobody in my class considers me
popular to 4 = almost everyone in class considers me popular).
Material
Cyber scenario vignettes. All students were asked to nominate the
most popular student as well as the most unpopular student within
their class by their rst names. For example, one student could have
nominated Bob as being the most popular student and Lisa as
being the most unpopular student. Furthermore, students had to indicate the sex of these nominated classmates (male or female) as well
as their personal liking (1 = I don't like [insert name of the nominated
student] to 4 = I do like [insert name of the nominated student]). These
names were automatically inserted into the following cyber scenario:
Imagine you logged into schlerVZ (a German online social network), looked at your bulletin board and saw a new entry that was
Cyber experience questionnaire. We adapted the cyberbullying questionnaire of Riebel et al. (2009) to include the following ve of Willard's
(2007) categories: harassment, denigration, impersonation, outing, and
exclusion. Students were asked how often these incidents have happened
to them via cell phone or via the internet (cyber-victim) and how often
they had instigated such incidents themselves (cyber-perpetrator). All
answers were given on 3-point scales with the categories never (= 0),
once (= 1), and several times (= 2). Cyber Involvement was diagnosed if
students gave at least once a different answer than never (cyber-victim
and cyber-perpetrator). Note that we explicitly do not refer to these incidents as cyberbullying because not all dening criteria such as repetition
are met.
100
Results
90
Bully+ M (SD)
4.04
2.97
2.44
6.25
4.50
4.20
(1.93)
(1.86)
(1.48)
(1.12)
(1.77)
(1.22)
Bully M (SD)
2.78
1.97
1.85
5.65
3.87
3.43
(1.75)
(1.38)
(1.09)
(1.48)
(1.88)
(1.15)
Note. All answers were given on a scale from 1 = Positive Mood to 7 = Negative
Mood.
80
Percent (%)
Descriptive results
The random assignment of experimental conditions was successful.
Approximately the same number of students was assigned to each condition (Group A: n = 91; Group B: n = 95) and these groups did not
differ systematically in sex, 2 (1) = 2.17, p = .153; age, t (184) =
.730, p = .466; or perceived popularity, t (184) = 1.117, p = .266.
Furthermore, students in both experimental groups (Group A vs. Group
B) nominated popular and unpopular students who did not differ systematically in sex, Bully+: 2 (1) = .01, p = .922; Bully: 2 (1) =
.23, p = .630, or in being liked by the participating students, Bully+:
t (184) = 1.123, p = .263; Bully: t (184) = .916, p = .361. Therefore, all requirements for further analyses were met, all descriptive results will be reported for the overall sample, and the variables sex, age,
and perceived popularity of the participating students as well as sex
and being liked of the nominated popular and unpopular students will
not be considered in the testing of Hypotheses 1 and 2.
On average students' most pronounced mood after reading all cyber
scenarios was Anger, followed by Sorrow, Despair, Tiredness, and Positive Mood (see Table 1). Overall, students reported low Helpless Cognitions (Bully+: M = 1.95, SD = 0.90; Bully: M = 1.74, SD = 0.90)
and only few coping strategies (Coping Strategies Question: Bully+:
M = 2.03, SD = 0.94; Bully: M = 2.15, SD = 0.95). Most often students indicated coping strategies that were categorized as Confrontation, followed by Social and Technical coping and Depreciation (see
Fig. 1). Helpless, Passive, and Aggressive coping as well as Rationalization were indicated less frequently.
Of the whole sample 132 students (71%) were categorized as
cyber-victims and 94 students (51%) as cyber-perpetrators.
Cyber-victimization and perpetration were signicantly related (Phi
coefcient: r = .22, p = .003). Seventy-six students (41%) were
cyber-victims as well as cyber-perpetrators. Students most often
nominated girls as popular (girls: n = 109, 59% vs. boys: n = 77,
41%) and unpopular classmates (girls: n = 105, 57% vs. boys: n =
81, 43%). The popular students were liked signicantly more by the
participating students (M = 3.23, SD = 0.79) than the unpopular
students, M = 2.13, SD = 0.84; t (185) = 13.06, p b .001.
245
Bully+
Bully-
70
60
50
40
30
20
10
0
246
Fig. 2. Negative Mood (left) and Helpless Cognition (right) by Social Status of the cyber-bully (Bully+ vs. Bully) and presentation Order (Group A vs. Group B). For both scales
ANOVAs yielded signicant main effects of Social Status and signicant interactions between Social Status and Order.
separate regressions. All potentially relevant descriptors of the participating students (sex, age, grade, perceived popularity, and experience as cyber-victim and as cyber-perpetrator), all potentially
relevant descriptors of the ctitious Bully+ or Bully (sex and the
degree of being liked by the participating student), as well as the
Order of presentation (Group A vs. Group B) were used as predictors
in these regressions. Because of the exploratory (and not conrmatory) nature of this research question, aimed at understanding the most
parsimonious explanation of these criteria, stepwise regressions were
utilized (Thayer, 2002). This method only enters variables that significantly contribute to the regression model; all predictors that are not
included in the nal regression models do not signicantly explain
additional variance.
The stepwise regression for Negative Mood in the Bully+ condition shows that (in the order of inclusion) if the Bully+ is a girl and
if the participating student is unpopular, Negative Mood is more pronounced after reading the ctitious cyber scenario (see Table 2). The
stepwise regression for Helpless Cognitions in the Bully + condition
shows that (in the order of inclusion) if the participating student is
unpopular, if the Bully+ scenario is presented rst (vs. second),
and if the student is young, Helpless Cognitions are more likely to
occur after reading the ctitious cyber scenario (see Table 3).
The stepwise regression for Negative Mood in the Bully
condition shows that (in the order of inclusion) if the participating
student likes the Bully , if the participating student is unpopular,
if the Bully scenario is presented rst (vs. second), and if the participating student is a girl, Negative Mood is more pronounced after
reading the ctitious cyber scenario (see Table 4). The stepwise regression for Helpless Cognitions in the Bully condition shows
that (in the order of inclusion) if the Bully scenario is presented
rst (vs. second), and if the participating student is unpopular,
young, and a girl, Helpless Cognitions are more likely to occur after
reading the ctitious cyber scenario (see Table 5).
The interaction effects between the factors of Social Status (Bully+ vs.
Bully) and presentation Order (Group A vs. Group B) all indicate that
the confrontation with the second cyber incident is not as distressing
as the confrontation with the rst. This effect was most pronounced for
Helpless Cognitions which seem to be most susceptible to desensitization.
Our Exploratory Research Question 3 also yielded interesting results. All indicators of distress were more pronounced if the participating student was unpopular (4/4 effects). Furthermore, being
bullied by an unpopular cyber-bully (vs. a popular cyber-bully) was
experienced to be more distressing for girls than for boys (2/2 effects)
and younger students experienced more helpless cognitions (but not
more negative mood; 2/2 effects). This shows that personal characteristics of the cyber-victim moderate the effects of cyber incident
scenarios. In this context perceived popularity, sex, and age seem to
be more important than the personal prior experience as a cybervictim or as a cyber-perpetrator. Additionally, personal characteristics
of the hypothetical cyber-bully did not consistently elicit effects (1/4
effects of sex; 1/4 effects of being liked) and seem to play a secondary
role.
Despite these promising results this study has some specic limitations that need to be considered: We recruited the participants of this
study via social network sites. Therefore, this study constitutes an uncontrolled eld experiment. Even though we know that the majority
of German adolescents uses the internet daily, most often to communicate via online communities (Medienpdagogischer Forschungsverbund
Sdwest (mpfs), 2011), we have no information about the representativeness of the nal sample (Granello & Wheaton, 2004). Furthermore
only the data of 40 % of the participants who started the online questionnaire could be used for analyses. Therefore, we do not know if selective
drop-out might be another potential problem. Even though more girls
than boys use social networking sites in Germany (mpfs, 2011), the uneven sex distribution in the nal sample could be a sign of selective
drop-out that might have inuenced the results.
Discussion of Study I
We conrmed our Hypothesis 1. Being harassed by a popular
cyber-bully is indeed more distressing than being harassed by an unpopular cyber-bully. More specically, this study indicates that in
these scenarios cyberbullying by a popular cyber-bully elicited more
Negative Mood (regarding all subscales), more Helpless Cognitions,
and a different pattern of Coping Strategies, namely more Helpless
coping, less Aggressive coping and less Depreciation.
We conrmed our Hypothesis 2. By being repeatedly confronted with
negative cyber incident vignettes cyber-victims become desensitized.
Table 2
Stepwise regression models for explaining Negative Mood in the Bully+ condition.
Step 1
Bully+ sexa
Step 2
Bully+ sexa
Student popularity
SE B
T value
.735
.174
.297
4.221***
.691
.245
.173
.102
.280
.168
4.001***
2.403*
Adj R2
F change
.083
17.813***
.106
5.775*
Step 1
Student popularity
Step 2
Student popularity
Presentation Ordera
Step 3
Student popularity
Presentation Ordera
Student age
SE B
T value
.386
.075
.339
4.889***
.347
.349
.319
.371
.079
a
.073
.123
.073
.121
.030
.323
.194
.297
.206
.181
Adj R2
F change
.110
23.906***
.143
8.092**
.171
7.145**
4.732***
2.845**
4.377***
3.062**
2.673**
Table 4
Stepwise regression models for explaining Negative Mood in the Bully condition.
B
Step 1
Bully being liked
Step 2
Bully being liked
Student popularity
Step 3
Bully being liked
Student popularity
Presentation Ordera
Step 4
Bully being liked
Student popularity
Presentation Ordera
Student sexb
SE B
T value
.407
.096
.298
4.241***
.395
.354
.093
.093
.290
.259
4.261***
3.806***
.416
.380
.538
.090
.091
.152
.305
.277
.235
4.614***
4.196***
3.548***
.397
.356
.495
.383
.089
.090
.151
.165
.291
.260
.216
.154
Adj R2
F change
.084
17.989***
.147
14.487***
.197
12.587***
.216
5.389*
4.435***
3.955***
3.275**
2.321*
1=
247
Table 5
Stepwise regression models for explaining Helpless Cognitions in the Bully condition.
B
Step 1
Presentation Ordera
Step 2
Presentation Ordera
Student popularity
Step 3
Presentation Ordera
Student popularity
Student age
Step 4
Presentation Ordera
Student popularity
Student age
Student sexb
SE B
T value
.592
.125
.331
4.753***
.630
.277
.121
.072
.352
.258
5.225***
3.833***
.611
.252
.070
.119
.072
.029
.341
.235
.159
5.122***
3.500**
2.377*
.583
.235
.069
.263
.119
.072
.029
.130
.326
.220
.159
.135
4.893***
3.276**
2.385*
2.026*
Adj R2
F change
.105
22.594***
.167
14.693***
.187
5.652*
.201
4.107*
1=
248
versions of the questionnaire battery. Fictitious cyber scenario vignettes were developed for all experimental conditions of the two
by two between-subject design (Media Type of cyberbullying):
HT (harassment via text), HV (harassment via video), OT (outing via
text), and OV (outing via video). All students answered a questionnaire
battery consisting of the Current Mood Scale, the Coping Strategies
Questionnaire, the Cyber Experience Questionnaire, and the Internet
Use Questionnaire. On average students needed approximately
25 min to answer all questions.
All students participated voluntarily and gave their informed
consent; furthermore, the school's headmaster gave his informed
consent in loco parentis. All participants received sweets for their
participation. At the end of the study the trained investigators disclosed
the purpose of the study, pointed out that the cyber scenarios were
ctitious, and answered all remaining questions.
Participants
We recruited a convenience sample of 138 students from three
6th grade classrooms and three 7th grade classrooms of a smalltown comprehensive school in Germany. Because of missing values
or no variance in response, data from eleven students had to be excluded from further analyses. Therefore, the nal sample consists of
n = 127 students. These 65 boys and 62 girls were between 11 and
15 years old (M = 12.36, SD = 0.89). Within the three-tier German
school system, 114 (90 %) of these students attended the middle
track whereas 13 (10 %) attended the lowest track.
Material
Cyber scenario vignettes. Fictitious cyber scenario vignettes were developed and systematically manipulated according to the experimental
conditions Type (harassment vs. outing) and Media (text vs. video)
of cyberbullying. Four distinct experimental conditions resulted: HT
(harassment via text), HV (harassment via video), OT (outing via
text), and OV (outing via video). In the HT condition students were
told that a written insult against them was posted on a public website
and all students in their class received the link. The insult read You
are nasty lth. At your birth the doctor had to puke after seeing how
ugly you are. (See Study I.). In the HV condition the same insult was
supposedly posted as a video message.
In the OT condition students were told that their whole class received a message that disclosed an embarrassing secret about them.
First, they had to imagine this ctitious secret: You are in love with
someone but nobody knows about that yet not even the subject
of your love. Someone overheard you nally telling somebody else
on the telephone. The next day the message reads Hey everyone!
Guess what I overheard yesterday. [insert your name] is in love
with [insert name of the subject of your secret love]. [insert name of
the subject of your secret love] does not know it yet but [insert
your name] thinks of him/her constantly. In the OV condition the
same secret was supposedly disclosed in a video about your phone
conversation that was sent to everyone in class.
Current mood scale. The ASTS (Aktuelle Stimmungsskala; Dalbert,
1992) is a scale with 19 adjectives; all adjectives had to be rated on
7-point scales regarding agreement (1 = low 7 = high). Students
had to answer all questions in reference to the ctitious cyber scenario.
This instrument was adapted to the current study by adding the adjectives troubled and scared. Therefore, an exploratory factor analysis
was computed and revealed three factors explaining 55.85% of variance:
The scale Sad Mood (SM) consists of 10 adjectives (examples: desperate,
miserable, scared, hopeless) and is reliable (Cronbach's = .90). The
scale Angry Mood (AM) consists of 3 adjectives (angry, annoyed, furious) and is reliable (Cronbach's = .80). Finally, the scale Joyous
Mood (JM) consists of 4 adjectives (comfortable, joyous, cheery,
for further analyses are met and all descriptive results will be reported
for the overall sample.
On average students' most pronounced mood after reading the
cyber scenarios was Angry Mood (AM: M = 5.29, SD = 1.41),
followed by Sad Mood (SM: M = 3.51, SD = 1.36) and Joyous
Mood (JM: M = 1.21, SD = 0.51). Furthermore, on average the students reported just about two coping strategies in their open answers
(M = 1.70, SD = 0.91) and their average Active Coping score was
M = 2.79 (SD = 0.62). More specically, students' open answers indicate that, on average, they were most likely to employ Social coping
and least likely to employ Legal coping (see Fig. 4).
Seventy students (55%) were categorized as cyber-victims and 26
(21%) as cyberbullying-victims. Sixty-ve students (51%) were categorized as cyber-perpetrators and 21 (17%) as cyberbullying-perpetrators.
Cyber-victimization and perpetration were signicantly related. Fiftytwo students (41%) were cyber-victims as well as cyber-perpetrators
(Phi coefcient: r = .53, p b .001) and 8 students (6%) were
cyberbullying-victims as well as cyberbullying-perpetrators (r =
.21, p b .05).
Students on average used Google (M = 4.60, SD = 1.38),
schlerVZ (M = 4.43, SD = 1.83) and video portals (M = 4.28,
SD = 1.60) several times a week; they used chat (M = 3.88, SD =
1.97), emails (M = 2.93, SD = 1.53), and instant messenger (M =
2.85, SD = 2.07) approximately once a week; and they rarely or
never used Facebook (M = 2.29, SD = 1.99), internet forums
(M = 1.77, SD = 1.29) or blogs (M = 1.36, SD = 0.95).
249
Discussion of Study II
We partly conrmed our Hypothesis 1. Videos used in the cyber
incident scenarios are more distressing for cyber-victims than texts
and result in more negative affect (Angry Mood) and more planned
behavior (Active Coping). However, we found no effects of Media
used in the cyber incident scenarios on Sad Mood, Joyous Mood, or
students' open answers regarding their Coping Strategies.
We partly conrmed our Hypothesis 2. Different Types of cyber
incident vignettes have different effects and thus result in different
affects and behaviors. More specically, regarding Angry Mood,
the effects of Media were more pronounced for harassment than
for outing. Active Coping was more pronounced for harassment
than for outing, and students' open answers indicate that harassment results in more Social, Technical, and Legal coping and in less
Passive coping compared to outing. However, we found no effects
of Type used in the cyber incident scenarios on Sad Mood or Joyous
Mood.
Our Exploratory Research Question 3 also yielded interesting results. Students' sex did not only moderate the effects of Media and
Type of cyber incident, sex was the only variable signicantly affecting students' Sad Mood and Joyous Mood. In both cases girls were
more negatively affected by reading the cyber vignettes. Additionally,
girls also reported more Active Coping and their open answers indicate that they would use more Social coping and less Aggressive coping than boys.
Despite these promising results this study has some specic limitations that need to be considered (also see limitations of Study I, for
example regarding the use of hypothetical vignettes and regarding
the generalizability sex effects): In this study, we recruited whole
classes and administered paper-and-pencil questionnaires. We therefore avoided some critical issues of online data collection, for example
we avoided self-selection effects and numerous drop-outs (see Study
I). However, the sample was fairly small and we have no information
about its representativeness. We also do not know if the classroom
context with the social dynamics of bullying being present, namely
bullies, victims, and bystanders, had any effects on the results. However, the fact that we partly replicated the effects of Media detected
by Smith and colleagues (Slonje & Smith, 2008; Smith et al., 2008)
with a novel experimental approach underlines the validity of these
effects and our methodology.
Another important issue that needs to be addressed is the problem
of confounded variables. In this study, it was impossible to create a
ctitious cyber scenario that was only varied through the experimental dimensions of Medium (video vs. text) and Type (harassment vs.
outing). Types of cyber incidents are not independent from Media.
For example, it is hard to conceptualize a cyber scenario in which
videos are used to exclude someone from an activity on Facebook. Besides these confounded variables, there might be other underlying dimensions relevant for media effects these variables should be
considered in future research. We were able to control these variables
in this study by holding them constant across all experimental conditions. For example, synchronicity was controlled by choosing asynchronous forms of cyber incidents (vs. synchronous) and publicity
was controlled by choosing a public website for all cyber incidents
(vs. private vs. semi-public).
Despite these limitations we can draw some tentative conclusions.
For some affective variables (Sad Mood, Joyous Mood) sex seems to
be more relevant than either Medium or Type of cyber incident. Furthermore, this is to our knowledge the rst study that could demonstrate that the Types of cyberbullying proposed by Willard (2007)
have different effects on cyber-victims. Therefore, this is the rst attempt to test this theoretical framework empirically. However, further research is needed to determine if these effects hold true in
more representative samples, and if the dimensions of interest truly
caused these effects or if confounded variables are to blame.
250
Fig. 3. Students' Angry Mood (left; signicant main effect of Medium and signicant interaction Medium Type) and Active Coping (right; signicant main effects of Medium,
Type, and Sex) by sex, medium (T = text vs. V = video) and type (H = harassment vs. O = outing) of cyberbullying.
harassment
90
Percent (%)
80
outing
70
60
50
40
30
20
10
0
251
Huang, Y. -Y., & Chou, C. (2010). An analysis of multiple factors of cyberbullying among
junior high school students in Taiwan. Computers in Human Behavior, 26,
15811590.
Katzer, C., Fetchenhauer, D., & Belschak, F. (2009a). Cyberbullying in
Internet-Chatrooms Wer sind die Tter? Ein Vergleich von Bullying in
Internet-Chatrooms mit Bullying in der Schule aus der Tterperspektive
[Cyberbullying in internet-chatrooms Who are the bullies? A comparison between bullying in internet-chatrooms and bullying in school from the perspective
of the bully]. Zeitschrift fr Entwicklungspsychologie und Pdagogische Psychologie,
41(1), 3344, http://dx.doi.org/10.1027/1864-1105.21.1.25.
Katzer, C., Fetchenhauer, D., & Belschak, F. (2009b). Cyberbullying: Who are the victims? A comparison of victimization in internet chatrooms and victimization in
school. Journal of Media Psychology, 21(1), 2536.
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of
computer-mediated communication. American Psychologist, 39(10), 11231134,
http://dx.doi.org/10.1037/0003-066X.39.10.1123.
LaFontana, K. M., & Cillessen, A. N. (2010). Developmental changes in the priority of
perceived status in childhood and adolescence. Social Development, 19(1),
130147, http://dx.doi.org/10.1111/j.1467-9507.2008.00522.x.
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27(2), 157170, http://dx.doi.org/10.1177/0143034306064547.
Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools.
Computers in Human Behavior, 23(4), 17771791, http://dx.doi.org/10.1016/
j.chb.2005.10.005.
Medienpdagogischer Forschungsverbund Sdwest (mpfs) (2011). JIM-studie 2011,
jugend, information, (multi-)media. Basisstudie zum Medienumgang 12-bis
19-Jhriger in Deutschland [JIM-study 2011. Youth, information, (multi)media].
Representative study about media use of 1219 year olds in Germany. Stuttgart: MPFS.
Menesini, E., & Nocentini, A. (2009). Cyberbullying denition and measurement: Some
critical considerations. Zeitschrift Fr Psychologie/Journal of Psychology, 217(4),
230232, http://dx.doi.org/10.1027/0044-3409.217.4.230.
Nocentini, A., Calmaestra, J., Schultze-Krumbholz, A., Scheithauer, H., Ortega, R., &
Menesini, E. (2010). Cyberbullying: Labels, behaviours and denition in three
European countries. Australian Journal of Guidance & Counselling, 20(2), 129142,
http://dx.doi.org/10.1375/ajgc.20.2.129.
Olweus, D. (1996). Gewalt in der Schule: Was Lehrer und Eltern wissen sollten und tun
knnen [Violence in school: What teachers and parents should know And can do].
Bern: Huber.
Ortega, R., Mora-Merchn, J. A., & Jger, T. (Eds.). (2007). Acting against school bullying
and violence. The role of media, local authorities and the Internet [e-book]. Landau:
Verlag Empirische Pdagogik, http://dx.doi.org/10.1027/0044-3409.217.4.197.
Paivio, A. (1986). Mental representations: A dual coding approach. New York, NY: Oxford
University Press.
Parkhurst, J. T., & Hopmeyer, A. (1998). Sociometric popularity and peer-perceived
popularity: Two distinct dimensions of peer status. The Journal of Early Adolescence,
18(2), 125144, http://dx.doi.org/10.1177/0272431698018002001.
Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look
at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148169, http://dx.doi.org/
10.1177/1541204006286288.
Pieschl, S., & Porsch, T. (2012). Schluss mit Cybermobbing! Das Trainings- und
Prventionsprogramm Surf-Fair [Stop cyberbullying! The training and prevention
program Surf-Fair]. Weinheim: Beltz.
Raskauskas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying
among adolescents. Developmental Psychology, 43(3), 564575, http://dx.doi.org/
10.1037/0012-1649.43.3.564.
Riebel, J., Jger, R., & Fischer, U. C. (2009). Cyberbullying in Germany An exploration
of prevalence, overlapping with real life bullying and coping strategies. Psychology
Science Quarterly, 51(3), 298314.
Scheithauer, H., Hayer, T., & Bull, H. D. (2007). Gewalt an Schulen am Beispiel von Bullying. Aktuelle Aspekte eines populren Themas [Violence at schools regarding the example of bullying. New aspects of a popular topic]. Zeitschrift fr Sozialpsychologie,
38(3), 141152, http://dx.doi.org/10.1024/0044-3514.38.3.141.
Schultze-Krumbholz, A., & Scheithauer, H. (2009). Socialbehavioral correlates of
cyberbullying in a German student sample. Zeitschrift fr Psychologie/Journal of Psychology, 217(4), 224226.
Sijtsema, J. J., Veenstra, R., Lindenberg, S., & Salmivalli, C. (2009). Empirical test of
bullies' status goals: Assessing direct goals, aggression, and prestige. Aggressive Behavior, 35(1), 5767, http://dx.doi.org/10.1002/ab.20282.
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying?
Scandinavian Journal of Psychology, 49(2), 147154, http://dx.doi.org/10.1111/
j.1467-9450.2007.00611.x.
Smith, P. K., Mahdavi, J., Carvalho, M., Fischer, S., Rusell, S., & Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child
Psychology and Psychiatry, 49(4), 376385, http://dx.doi.org/10.1111/j.1469-7610.
2007.01846.x.
Sourander, A., Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., et al.
(2010). Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of General Psychiatry, 67(7), 720728,
http://dx.doi.org/10.1001/archgenpsychiatry.2010.79.
Staude-Mller, F., Bliesener, T., & Nowak, N. (2009). Cyberbullying und
Opfererfahrungen von Kindern und Jugendlichen im Web 2.0 [Cyberbullying and
victim experience of children and adolescents in the Web 2.0]. Kinder- und
Jugendschutz in Wissenschaft und Praxis, 2, 4247.
Thayer, J. D. (2002). Stepwise regression as an exploratory data analysis procedure.
Paper presented at the Annual Meeting of the American Educational Research Association
(AERA), New Orleans, LA, USA.
252
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26,
277287.
Tto, M. M., & Farrington, D. P. (2008). Reintegrative shaming theory, moral emotions
and bullying. Aggressive Behavior, 34(4), 352368, http://dx.doi.org/10.1002/
ab.20257.
Utsumi, S. (2010). Cyberbullying among middle school students: Association with
children's perception of parental control and relational aggression. Japanese Journal
of Educational Psychology, 58(1), 1222.
Vandebosch, H., & Van Cleemput, K. (2008). Dening cyberbullying: A qualitative research into the perceptions of youngsters. Cyberpsychology & Behavior, 11(4),
499503, http://dx.doi.org/10.1089/cpb.2007.0042.
Wachs, S., & Wolf, K. D. (2011). Zusammenhnge zwischen Cyberbullying und Bullying
erste Ergebnisse aus einer Selbstberichtsstudie [Correlates of cyberbullying and
bullying First results of a self-report study]. Praxis der Kinderpsychologie und
Kinderpsychiatrie, 60, 735744.
Willard, N. E. (2007). Cyberbullying and cyberthreats. Responding to the challenge of
online social aggression, threats, and distress. Champaign, Illinois: Research Press.
Witvliet, M., Olthof, T., Hoeksma, J. B., Goossens, F. A., Smits, M. I., & Koot, H. M. (2010). Peer
group afliation of children: The role of perceived popularity, likeability, and behavioral
similarity in bullying. Social Development, 19(2), 285303, http://dx.doi.org/10.1111/
j.1467-9507.2009.00544.x.
Yoon, J. S. (2004). Predicting teacher interventions in bullying situations. Education and
Treatment of Children, 27(1), 3745.