Predicting Cyberbullying: Research, Theory, and Intervention
()
About this ebook
Predicting Cyberbullying: Research, Theory, and Intervention delves into the theoretical advances that have been made to predict cyberbullying perpetration. It examines myriad psychological- and communication-based theories, discusses the relevant research to support (or not) each theory, and elucidates the strengths and limitations of these theories. Moreover, the book differentiates cyberbullying from traditional bullying to expand on a theory that takes such differences into account to predict perpetration. In addition, it adapts interventions to address these nuanced theoretical advancements and concludes with an examination of validated psychological theories that can inform interventions and reduce cyberbullying.
The book is an effective and concise reference for psychologists, school administrators, counselors and psychological researchers looking to understand theory and interventions for cyberbullies.
- Focuses on the cyberbully perpetrator
- Balances theory with interventional applications
- Identifies key risk factors in those who cyberbully
- Explores the scope of theoretically driven hypotheses specific to cyberbullying
Christopher Paul Barlett
Christopher Barlett was trained as an aggression scholar and has been studying the risk factors of cyberbullying perpetration since 2010. He has published over sixteen book chapters and peer-reviewed papers on the topic. He has conducted correlational and longitudinal studies devoted to examining the variables that predict cyberbullying in youth, emerging adults, and older adults. Dr. Barlett is the creator of the Barlett and Gentile Cyberbullying Model (BGCM), the only published cyberbullying-specific psychological model that elucidates the psychological processes to predict cyberbullying perpetration.
Related to Predicting Cyberbullying
Related ebooks
The Dark Side of Social Media: Psychological, Managerial, and Societal Perspectives Rating: 3 out of 5 stars3/5Social Media Security: Leveraging Social Networking While Mitigating Risk Rating: 5 out of 5 stars5/5Boundaries of Self and Reality Online: Implications of Digitally Constructed Realities Rating: 5 out of 5 stars5/5Reducing Cyberbullying in Schools: International Evidence-Based Best Practices Rating: 5 out of 5 stars5/5Cyberbullying: What Every Parent Should Know About Electronic Bullying Rating: 4 out of 5 stars4/5Cyberbullying Rating: 0 out of 5 stars0 ratingsHow the World Changed Social Media Rating: 5 out of 5 stars5/5Eradicating Cyber Bullying: Through Online Training, Reporting & Tracking System Rating: 5 out of 5 stars5/5Social Media: Dynamism, Issues, and Challenges Rating: 0 out of 5 stars0 ratingsDigital Identities: Creating and Communicating the Online Self Rating: 1 out of 5 stars1/5Emotions, Technology, and Social Media Rating: 2 out of 5 stars2/5Living Online Rating: 5 out of 5 stars5/5Social Media and Its Psychological Effects Rating: 5 out of 5 stars5/5Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications Rating: 4 out of 5 stars4/5Summary of Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Rating: 0 out of 5 stars0 ratingsCyberbullying: What Counselors Need to Know Rating: 0 out of 5 stars0 ratingsOnline Stalking and Online Activities: An evaluation of risks and their perception Rating: 0 out of 5 stars0 ratingsPsychologist's Guide to Adolescents and Social Media Rating: 0 out of 5 stars0 ratingsBehavioral Forensics: Using Applied Behavior Analysis in Psychological Court Evaluations Rating: 4 out of 5 stars4/5Computational Approaches to Studying the Co-evolution of Networks and Behavior in Social Dilemmas Rating: 0 out of 5 stars0 ratingsInternet Addiction: A Handbook and Guide to Evaluation and Treatment Rating: 4 out of 5 stars4/5Cyberbullying: Bullying in the Digital Age Rating: 0 out of 5 stars0 ratingsIntroduction to Social Media Investigation: A Hands-on Approach Rating: 5 out of 5 stars5/5Treatment of High-Risk Sexual Offenders: An Integrated Approach Rating: 0 out of 5 stars0 ratingsInvisible Wounds: The complete guide to preventing and dealing with bullying and cyberbullying Rating: 0 out of 5 stars0 ratingsCyberpocalypse: Inside the Digital Assault on Healthcare Rating: 0 out of 5 stars0 ratingsTeenagers, Sexual Health Information and the Digital Age Rating: 0 out of 5 stars0 ratingsThe Quick Fix: Why Fad Psychology Can't Cure Our Social Ills Rating: 4 out of 5 stars4/5Adult Attachment: A Concise Introduction to Theory and Research Rating: 3 out of 5 stars3/5
Psychology For You
What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People Rating: 4 out of 5 stars4/5101 Fun Personality Quizzes: Who Are You . . . Really?! Rating: 3 out of 5 stars3/5The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life Rating: 4 out of 5 stars4/5How to Win Friends and Influence People: Updated For the Next Generation of Leaders Rating: 4 out of 5 stars4/5The Art of Letting Go: Stop Overthinking, Stop Negative Spirals, and Find Emotional Freedom Rating: 4 out of 5 stars4/5The Source: The Secrets of the Universe, the Science of the Brain Rating: 4 out of 5 stars4/5How to Talk to Anyone: 92 Little Tricks for Big Success in Relationships Rating: 4 out of 5 stars4/5The Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Divergent Mind: Thriving in a World That Wasn't Designed for You Rating: 4 out of 5 stars4/5Maybe You Should Talk to Someone: A Therapist, HER Therapist, and Our Lives Revealed Rating: 4 out of 5 stars4/5It's OK That You're Not OK: Meeting Grief and Loss in a Culture That Doesn't Understand Rating: 4 out of 5 stars4/5ADHD: A Hunter in a Farmer's World Rating: 4 out of 5 stars4/5The Denial of Death Rating: 4 out of 5 stars4/5The Covert Passive Aggressive Narcissist: The Narcissism Series, #1 Rating: 5 out of 5 stars5/5Self-Care for People with ADHD: 100+ Ways to Recharge, De-Stress, and Prioritize You! Rating: 5 out of 5 stars5/5What Happened to You?: Conversations on Trauma, Resilience, and Healing Rating: 4 out of 5 stars4/5How to Keep House While Drowning: A Gentle Approach to Cleaning and Organizing Rating: 5 out of 5 stars5/5Personality Types: Using the Enneagram for Self-Discovery Rating: 4 out of 5 stars4/5Anxious for Nothing: Finding Calm in a Chaotic World Rating: 4 out of 5 stars4/5Uniquely Human: A Different Way of Seeing Autism Rating: 4 out of 5 stars4/5No Bad Parts: Healing Trauma and Restoring Wholeness with the Internal Family Systems Model Rating: 5 out of 5 stars5/5Why We Sleep: Unlocking the Power of Sleep and Dreams Rating: 4 out of 5 stars4/5Running on Empty: Overcome Your Childhood Emotional Neglect Rating: 4 out of 5 stars4/5
Reviews for Predicting Cyberbullying
0 ratings0 reviews
Book preview
Predicting Cyberbullying - Christopher Paul Barlett
Predicting Cyberbullying
Research, Theory, and Intervention
Christopher Paul Barlett, PhD
Associate Professor of Psychology, Gettysburg College, Gettysburg, PA, United States
Table of Contents
Cover image
Title page
Copyright
Dedication
Preface
Scope of This Book
Part I: Cyberbullying in a Descriptive Context
Chapter 1. Cyberbullying in Context
Abstract
Defining Cyberbullying
Prevalence Rates and Issues With Measurement
Overall Conclusion
Chapter 2. Cyberbullying, Traditional Bullying, and Aggression: A Complicated Relationship
Abstract
Aggression and (Cyber)Bullying
Overall Conclusion
Chapter 3. Correlates of Cyberbullying
Abstract
Media-Violence Exposure
Participant Age
Culture
Research Design Issues
Overall Conclusion
Part II: Cyberbullying in a Theoretical Context
Chapter 4. The Importance of Theory
Abstract
Initial Cyberbullying Perpetration Research
Moving Toward Theoretical Extension
Overall Conclusion
Chapter 5. Social Psychology Theory Extensions
Abstract
Theory of Planned Behavior/Reasoned Action
General Aggression Model
Overall Conclusion
Chapter 6. Sociological Theory Extensions
Abstract
Social-Ecology Theory
General Strain Theory
Routine Activity Theory
Overall Conclusion
Chapter 7. Communication Theory Extensions
Abstract
Online Disinhibition Effect
Uses and Gratifications
Overall Conclusion
Chapter 8. Unique Cyberbullying Theory
Abstract
Barlett Gentile Cyberbullying Model
Social Media Cyberbullying Model
Overall Conclusion
Part III: Cyberbullying in an Intervention Context
Chapter 9. Combining Theory and Practice: Intervention Efforts to Reduce Antisocial Behaviors
Abstract
Overall Conclusion
Chapter 10. What We Can Learn From Broad Bullying and Aggression Interventions
Abstract
Aggression-Related Intervention Efforts
Traditional Bullying Interventions
Important Findings for Cyberbullying Interventions
Overall Conclusion
Chapter 11. Cyberbullying Intervention Efforts in Schools
Abstract
KiVa
ConRed
Media Heroes
ViSC
Other Interventions
Overall Conclusion
Chapter 12. Parents, Peers, Social Networking Companies, and Lawmakers’ Roles in Preventing Cyberbullying
Abstract
Parental Influences
Peer Influences
Social Networking Influence
Lawmakers’ Influence
Overall Conclusion
Chapter 13. Final Remarks
Abstract
Future Research: Primary Research
Future Research: Interventions
Overall Conclusion
References
Further Reading
Index
Copyright
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2019 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-816653-6
For Information on all Academic Press publications visit our website at https://www.elsevier.com/books-and-journals
Publisher: Nikki Levy
Acquisition Editor: Joslyn Chaiprasert-Paguio
Editorial Project Manager: Sandra Harron
Production Project Manager: Bharatwaj Varatharajan
Cover Designer: Christian J. Bilbow
Typeset by MPS Limited, Chennai, India
Dedication
This book and the work leading to this book are dedicated to my wife and three children. I love you all.
Preface
Megan Meier, Ryan Halligan, Brandy Vella, Ciara Pugsley, Erin Gallagher, Tyler Clementi, and Joshua Unsworth are teens who took their own lives after alleged cyberbullying incidents. It is unlikely that the cyber-victimization and the subsequent negative affect they experienced were the only causal factors that led to these suicides; however, the specific cyberbullying incidences acted as a catalyst to increase the likelihood of their suicides. There are countless others who have taken their own life after being cyber-victimized; however, an exhaustive list would pale in comparison to the sheer number of youth who are cyber-victimized and have not committed suicide. Youth all over the world are affected by the harm that others inflict on them online, and scholars are only just beginning to understand the ways that cyberbullying can be prevented.
Addressing the cyberbullying problem
is imperative. Several avenues exist for reducing the negative psychological impacts—including suicide—of being cyber-victimized. The first is to teach victimized youth the psychological tools necessary to cope with, or be resilient to, online harm. There is a great wealth of high-quality research that has examined such relations. For instance, Online Pestoppenstoppen
(Jacobs, Vollink, DeHue, & Lechner, 2014) is an online intervention in which users are taught: (1) emotion regulation strategies after a provocation; (2) how to cope with a cyber-attack; and (3) replacing irrational negative thoughts after being cyber-victimized. Moreover, understanding the negative psychological and behavioral consequences of being cyber-victimized can aid clinicians in designing treatments to reduce such consequences. Indeed, examining such negative outcomes was the focus of much early empirical work in this domain. This approach, however, is reactive, which means that it is designed to teach victimized youth skills to be resilient to cyber-victimization after it has occurred.
A second, less studied, and yet proactive, approach is to examine the variables that predict cyberbullying perpetration in an effort to understand why cyberbullying occurs. This approach is the focus of Predicting Cyberbullying. I believe that theoretically understanding the governing psychological processes when an individual will harm another online juxtaposed with knowing what variables predict perpetration is needed to inform intervention efforts to help reduce cyberbullying. Scholars have only recently begun to delve into this research and such burgeoning research trends are encouraging. The more the scientific community attends to and studies cyberbullying empirically, the better informed the broader community will be on this topic. Yet, despite recent research focused on cyberbullying perpetration (rather than cyber-victimization) there is still a general lack of studies that have applied theory to the study of cyberbullying perpetration.
Theory is a critical part of the scientific process that, according to psychologists, elucidates the causal mechanisms involved in predicting behavior. A high-quality theory should parsimoniously explain why behaviors are likely to be enacted and the conditions under which such behaviors are likely. To date, much of the cyberbullying perpetration literature is void of theory. Although atheoretical data are important for showing simple relationships or describing the context of a societal issue, the lack of theory application or creation in this field is troubling.
Scope of This Book
Rather than focusing on the cyber-victim, this book focuses on theoretically elucidating the psychological processes that predict cyberbullying perpetration. If reliable, theoretically driven results can uncover the reasons why cyberbullying perpetration occurs, then interventions can be tailored or created to focus on those processes which should, hopefully, reduce cyberbullying perpetration (e.g., Barlett, 2016, 2017). This does not preclude that focusing on the cyber-victim, as so much research has done, is worthless. I find much merit in the research that attempts to provide victims of online attacks the skills necessary to prevent the negative consequences of cyberbullying. Perhaps the best approach is to attempt to address cyberbullying issues using both approaches; however, I will argue in this book that a proactive approach of understanding the theoretical underpinnings of cyberbullying perpetration can hopefully reduce cyberbullying through refined, research-driven, intervention efforts. Before the field shifts this way, well-established theory must be applied, created, or altered to account for cyberbullying perpetration. Unfortunately, scientific research on cyberbullying perpetration using theory is largely missing.
This book provides a much-needed theory guide by presenting a single source that describes the various theoretical points of view pertaining to cyberbullying perpetration. I have divided this book into three parts. Part 1 consists of Chapters 1–3 that aims to show how early research findings juxtaposed with broad bullying and aggression theory helped to build current theoretical models of cyberbullying perpetration with varying degrees of success. Part 2 (Chapters 4–8) delves into the specific postulates of several theories that describe cyberbullying perpetration. Here, I separate the existing theories that have been applied, or created, to expand our knowledge of cyberbullying perpetration. Each chapter discusses the theories from varying disciplines (e.g., social psychology, communication, and sociology). Such partitioning is not exact. Indeed, many sociological theories, for example, have been used by other scholars in other disciplines. Thus such distinctions and classifications are, and should be interpreted as, only for ease of presentation. Chapter 4, The Importance of Theory, starts with the importance of theory in the scientific method and expands on how cyberbullying researchers should use theory before delving into the theoretical contributions from social psychology (Chapter 5: Social Psychology Theory Extensions), sociology (Chapter 6: Sociological Theory Extensions), and communication and media studies (Chapter 7: Communication Theory Extensions), and concludes with a discussion of a unique cyberbullying theory (Chapter 8: Unique Cyberbullying Theory). Overall, Part 2 represents the primary thesis of this book: Theory needs to be applied to the study of cyberbullying. It is my hope that this book will serve as a reference for scholars, school administrators, and others to understand the importance of theory while providing a list and description of currently available theories used to predict cyberbullying perpetration. Finally, Part 3 (Chapters 9–13) concludes the book by demonstrating how a quality theory can help inform interventions that have successfully reduced cyberbullying perpetration. Chapter 9, Combining Theory and Practice: Intervention Efforts to Reduce Antisocial Behaviors, explores the statistical considerations (from a procedural, analytical, and theoretical point of view) regarding cyberbullying intervention validation, and Chapter 10, What We Can Learn From Broad Bullying and Aggression Interventions, describes how cyberbullying interventions can benefit from existing traditional bullying and aggression interventions. Chapter 11, Cyberbullying Intervention Efforts in Schools, describes several well-validated interventions (and mentions others) with a focus on how theory can be used to guide the creation of cyberbullying interventions to yield a validated product or curriculum. Further avenues for cyberbullying prevention include parents, peers, social networking companies, and lawmakers, whose possible roles are described in Chapter 12, Parents, Peers, Social Networking Companies, and Lawmakers’ Roles in Preventing Cyberbullying. Finally, Chapter 13, Final Remarks, concludes the book.
I review many cyberbullying manuscripts for publication in various academic journals, book chapters, and books and am appalled by the number of studies submitted for publication that are mostly descriptive. As a field, we should be past the need for such atheoretical articles and instead be focused on process. Overall, I hope that this book energizes scholars to help shift research from atheoretical and mostly descriptive designs to study cyberbullying to a richer, theoretically driven literature that creates or utilizes theory to predict why cyberbullying occurs. Many suggestions for further research topics are highlighted throughout the book.
Part I
Cyberbullying in a Descriptive Context
Outline
Chapter 1 Cyberbullying in Context
Chapter 2 Cyberbullying, Traditional Bullying, and Aggression: A Complicated Relationship
Chapter 3 Correlates of Cyberbullying
Chapter 1
Cyberbullying in Context
Abstract
Cyberbullying perpetration is a pervasive social behavior that can cause many negative psychological, behavioral, and health outcomes for cyberbulling victims. Research has shown that cyberbullying occurs all over the world, across the developmental life span, and for both males and females. Understanding the variables and processes that predict cyberbullying perpetration is important for interventions aimed at reducing online, antisocial behavior. The purpose of this chapter is to introduce the reader to definitions of cyberbullying and discuss the prevalence rates of cyberbullying perpetration. Myriad theoretical and conceptual issues that confound the majority of definitions have serious implications for how cyberbullying perpetration is measured and its subsequent prevalence rates. These issues are discussed in this chapter.
Keywords
Cyberbullying; prevalence rates; definitions; cyber-aggression; measurement
The Internet boom of the late 1990s and early 2000s sparked a worldwide technological revolution. The creation of the Internet juxtaposed with the affordability of personal computers (PCs) sparked a new era of information gathering and sharing. Fig. 1.1 shows a graph of the average consumer price index for all urban consumers for PCs and peripheral equipment annually¹ and the percentage of the world population that had access to, and used, the Internet from 1998 to 2016.² The results clearly show that the cost of a PC decreased dramatically while the number of worldwide Internet users increased over the same time frame. Statistical analysis yields a correlation of r=−0.79, P<.001, despite the inverted logarithmic function of the data on the cost of PCs.
Figure 1.1 The worldwide adjusted consumer price index for all urban consumers for personal computers and peripheral equipment and the percentage of the population that were Internet users from 1998 to 2016.
Although not explicitly captured in Fig. 1.1, the creation and marketing of mobile phones, laptops, and tablets that allow for Internet access has only exacerbated this effect. Statistics on Internet use further highlight the pervasiveness of this social phenomenon. Indeed, Perrin and Jiang (2018) reported that 77% of US adults go online daily and that 89% from the same population group are online daily if they own a mobile device with Internet connectivity. Recent data (from the