5,798
Views
61
CrossRef citations to date
0
Altmetric
Original Articles

“I Hate Everything About You”: A Qualitative Examination of Cyberbullying and On-Line Aggression in a College Sample

&
Pages 364-377 | Received 10 May 2012, Accepted 03 Jan 2013, Published online: 14 Jan 2014

REFERENCES

  • Ahmed , Eliza. 2008 . “‘Stop it, That's Enough’: Bystander Intervention and its Relationship To School Connectedness and Shame Management.” Vulnerable Children and Youth Studies 3 : 203 – 213 .
  • Beran , Tanya and Qing Li . 2005 . “Cyber-Harassment: A Study of a New Method for an Old Behavior.” Journal of Educational Computing Research 32 ( 3 ): 265 – 277 .
  • Bhat , Christine Suniti . 2008 . “Cyber Bullying: Overview and Strategies for School Counselors, Guidance Officers, and All School Personnel.” Australian Journal of Guidance and Counseling 18 ( 1 ): 53 – 66 .
  • Black , Donald. 1983 . “Crime as Social Control.” American Sociological Review 48 : 34 – 45 .
  • Bowe , Greg. 2010 . “Reading Romance: The Impact Facebook Rituals Can Have on a Romantic Relationship.” Journal of Comparative Research in Anthropology and Sociology 1 ( 2 ): 61 – 77 .
  • Charon , Joel M. 2001 . Symbolic Interactionism: An Introduction, an Interpretation, an Integration. , 7th ed. Upper Saddle River , NJ : Prentice Hall .
  • Cohen , Lawrence E. and Marcus Felson . 1979 . “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44 : 588 – 608 .
  • Dilmac , Bulent. 2009 . “Psychological Needs as a Predictor of Cyberbullying: A Preliminary Report on College Students.” Educational Sciences: Theory and Practice 9 ( 3 ): 1307 – 1325 .
  • Emerson , Robert M. 2006 . “Neglected Issues in the Analysis of Informal Social Control.” Paper presented at the Annual Meeting of the American Sociological Association, August 11–14, Montreal, Quebec.
  • Emerson , Robert M. , Rachel I. Fretz , and Linda L. Shaw . 1995 . Writing Ethnographic Field Notes . Chicago : University of Chicago Press .
  • Erdur-Baker , Özgür. 2010 . “Cyberbullying and Its Correlation to Traditional Bullying, Gender and Frequent and Risky Usage of Internet-Mediated Communication Tools.” New Media and Society 12 ( 1 ): 109 – 125 .
  • Evans , Rhonda D. 2001 . “Examining the Informal Sanctioning of Deviance in a Chat Room Culture.” Deviant Behavior 22 : 195 – 210 .
  • Finn , Jerry. 2004 . “A Survey of Online Harassment at a University Campus.” Journal of Interpersonal Violence 19 ( 4 ): 468 – 483 .
  • Goldman , Russell. 2010 . “Teens Indicted After Allegedly Taunting Girl Who Hanged Herself.” ABCnews.com. Retrieved April 6, 2010 from (http://abcnews.go.com/Technology/TheLaw/teens-charged-bullying-mass-girl-kill/story?id=10231357) .
  • Goodnough , Abby. 2012 . “Student Faces Town's Wrath in Protest Against a Prayer.” NYTimes.com. Retrieved April 9, 2012 from (http://www.nytimes.com/2012/01/27/us/rhode-island-city-enraged-over-school-prayer-lawsuit.html?_r=2) .
  • Hay , Carter and Ryan Meldrum . 2010 . “Bullying Victimization and Adolescent Self-Harm: Testing Hypotheses from General Strain Theory.” Journal of Youth Adolescence 39 : 446 – 459 .
  • Herring , Susan C. 1999 . “The Rhetorical Dynamics of Gender Harassment On-Line.” The Information Society 15 : 151 – 167 .
  • Hinduja , Sameer and Justin W. Patchin . 2008 . “Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization.” Deviant Behavior 29 : 129 – 156 .
  • Holt , Thomas J. and Adam M. Bossler . “Examining the Applicability of Lifestyle-Routine Activities Theory for Cyber Crime Victimization.” Deviant Behavior 30 : 1 – 25 .
  • Juvonen , Jaana and Elisheva F. Gross . 2008 . “Extending the School Grounds?—Bullying Experiences in Cyberspace.” Journal of School Health 78 ( 9 ): 496 – 505 .
  • Katz , Jack. 1988 . Seductions of Crime . New York : Basic Books .
  • Larkin , Ralph W. 2007 . “Toward a Theory of Legitimated Adolescent Violence.” Paper presented at the Annual Meeting of the American Sociological Association, August 11–14, New York, New York.
  • Lenhart , Amanda , Kristen Purcell , Aaron Smith , and Kathryn Zichuhr . 2010 . “Social Media and Mobile Internet Use Among Teens and Young Adults.” Pew Internet and American Life Center. Retrieved October 6, 2011 from (http://www.pewinternet.org/Reports/2010/Social-Media-and-Young-Adults.aspx) .
  • Li , Qing. 2006. “Cyberbullying in Schools: A Research of Gender Differences.” School Psychology International 27(2):157–170.
  • MacKenzie , Iain. 2010 . “Student Kills Himself after Gay Sex Footage put Online.” BBCnews.com. Retrieved April 6, 2010 (from http://www.bbc.co.uk/news/world-us-canada-11446034) .
  • Marcum , Catherine D. , George E. Higgins , and Melissa L. Ricketts . 2010 . “Potential Factors of Online Victimization of Youth: An Examination of Adolescent Online Behaviors Utilizing Routing Activities Theory.” Deviant Behavior 31 : 381 – 410 .
  • Marsh , Louise , Rob McGee , Shyamala Nada-Raja , and Sheila Williams . 2010 . “Brief Report: Text Bullying and Traditional Bullying among New Zealand Secondary School Students.” Journal of Adolescence 33 : 237 – 240 .
  • Mead , George Herbert . 1934 . Mind, Self and Society: From the Standpoint of a Social Behaviorist . Chicago : University of Chicago Press .
  • Meltzer , Bernard , James Petras , and Larry Reynolds . 1975 . Symbolic Interactionism: Genesis, Varieties and Criticisms . London : Routledge and Kegan Paul .
  • Mishna , Faye , Michael Saini , and Steven Solomon . 2009 . “Ongoing and Online: Children and Youth's Perceptions of Cyberbullying.” Children and Youth Services Review 31 : 1222 – 1228 .
  • Mitchell , Kimberly J. , Janis Wolak , and David Finkelhor . 2008 . “Are Blogs Putting Youth at Risk for Online Sexual Solicitation or Harassment?” Child Abuse and Neglect 32 : 277 – 294 .
  • O'Connell , Paul , Debra Pepler , and Wendy Craig . 1999 . “Peer Involvement in Bullying: Insights and Challenges for Intervention.” Journal of Adolescence 22 : 437 – 452 .
  • Patchin , Justin W. and Sameer Hinduja . 2006 . “Bullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying.” Youth Violence and Juvenile Justice 4 ( 2 ): 148 – 169 .
  • Privitera , Carmel and Marilyn Anne Campbell . 2009 . “Cyberbullying: The New Face of Workplace Bullying?” Cyberpsychology and Behavior 12 ( 4 ): 395 – 400 .
  • Raskauskas , Juliana and Ann D. Stoltz . 2007 . “Involvement in Traditional and Electronic Bullying Among Adolescents.” Developmental Psychology 43 ( 3 ): 564 – 575 .
  • Scheff , Thomas J. 1988 . “Shame and Conformity: The Deference-Emotion System.” American Sociological Review 53 : 395 – 406 .
  • Sheridan , L. P. and T. Grant . 2007 . “Is Cyberstalking Different?” Psychology, Crime, and Law 13 ( 6 ): 627 – 640 .
  • Siann , Gerda , Margaret Callaghan , Peter Glissov , Ruth Lockheart , and Lorraine Rawson . 1994 . “Who Gets Bullied? The Effect of School, Gender, and Ethnic Group.” Educational Research 36 ( 2 ): 123 – 134 .
  • Smith , Peter K. , Jess Mahdavi , Manuel Carvalho , Sonja Fisher , Shanette Russell , and Neil Tippett . 2008 . “Cyberbullying: Its Nature and Impact in Secondary School Pupils.” Journal of Child Psychology and Psychiatry 49 ( 4 ): 376 – 385 .
  • Vandebosch , Heidi and Katrien Van Cleemput . 2008 . “Defining Cyberbullying: A Qualitative Research into the Perceptions of Youngsters.” Cyberpsychology and Behavior 11 ( 4 ): 499 – 503 .
  • Williams , Matthew. 2007 . “Policing and Cybersociety: The Maturation of Regulation within an Online Community.” Policing & Society 17 ( 1 ): 59 – 82 .
  • Ybarra , Michele and Kimberly Mitchell . 2004 . “Online Aggressor/Targets, Aggressors, and Targets: A Comparison of Associated Youth Characteristics.” Journal of Child Psychology and Psychiatry 45 ( 7 ): 1308 – 1316 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.