2016
DOI: 10.1177/0265407516668585
|View full text |Cite
|
Sign up to set email alerts
|

Examining the roles young people fulfill in five types of cyber bullying

Abstract: Ph +44 (0) 115 848 5558

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(26 citation statements)
references
References 47 publications
0
22
0
1
Order By: Relevance
“…In a more recent study, Betts, Gkimitzoudis, Spenser, and Baguley (2017), using a sample of 440 British students aged 16 to 19, identified four student profiles using a cluster analysis technique: "not involved" (33%), "rarely victim and bully" (40%), "typically victim" (26%), and "retaliator" (1%) [16]. In a subsequent study, Schultze-Krumbholz, Hess, Pfetsch, and Scheithauer (2018) used LCA on a sample of 849 German students (11 to 17 years of age), determining five groups: "prosocial defenders", "communicating outsiders", "aggressive defenders", "bully-victims", and "assistants" [17].…”
Section: Roles In Cyberbullyingmentioning
confidence: 99%
“…In a more recent study, Betts, Gkimitzoudis, Spenser, and Baguley (2017), using a sample of 440 British students aged 16 to 19, identified four student profiles using a cluster analysis technique: "not involved" (33%), "rarely victim and bully" (40%), "typically victim" (26%), and "retaliator" (1%) [16]. In a subsequent study, Schultze-Krumbholz, Hess, Pfetsch, and Scheithauer (2018) used LCA on a sample of 849 German students (11 to 17 years of age), determining five groups: "prosocial defenders", "communicating outsiders", "aggressive defenders", "bully-victims", and "assistants" [17].…”
Section: Roles In Cyberbullyingmentioning
confidence: 99%
“…Researchers who support the similarity of the phenomena claim that they are highly correlated and involve the same students (e.g., Betts et al 2017). According to the CB/CV and TB/TV definitions, both phenomena involve at least one perpetrator and one victim, while the existence of bully/ victims has been repeatedly confirmed (Slonje et al 2012), especially in CB/CV incidents (e.g., Antoniadou and Kokkinos 2013;Vandebosch and Van Cleemput 2009;Ybarra et al 2006).…”
Section: Introductionmentioning
confidence: 99%
“…between students and lecturers (e.g., DeSouza, 2010) or between higher education institutions' staff (e.g., Kang and Sidhu, 2015), however, some negative aspects of students' inter-relationship remain as if in a particular grey zone, and perpetrators not always remain identified and punished (Vidu et al, 2014;Valls et al, 2016). Conclusions of some researches on harassment and bullying performed in different cultures highlight that, in striving to ensure students' well-being, prevention policy of education institutions is important in tackling the problems related to bullying, assessing both direct interpersonal relationship and tendencies of rapid spread of bullying in cyberspace (DeSouza and Ribeiro, 2005;Valls et al, 2016;Betts et al, 2016;Myers and Cowie, 2017;etc.). Its importance grows when it's set that persons belonging to more than one disadvantaged groups more often suffer from assaults (Andersson et al, 2017), and some continuity exists, because bullying in childhood is related to aggressive behaviour when the person is an adult already (Sansone, Leung and Wiederman, 2012).…”
Section: Introductionmentioning
confidence: 99%