12,080
Views
98
CrossRef citations to date
0
Altmetric
Original Articles

Bystander Intervention in Cyberbullying

References

  • Beaman, A., Barnes, P. J., Klentz, B., & McQuirk, B. (1978). Increasing helping rates through information dissemination: Teaching pays. Personality and Social Psychology Bulletin, 4, 406–411. doi:10.1177/014616727800400309
  • Benjamini, Y., & Hochberg, Y. (1995). Controlling the false discovery rate: A practical and powerful approach to multiple testing. Journal of the Royal Statistical Society B, 57, 289–300. doi:10.2307/2346101
  • Blair, C. A., Foster Thompson, L., & Wuensch, K. L. (2005). Electronic helping behavior: The virtual presence of others makes a difference. Basic and Applied Social Psychology, 27, 171–178. doi:10.1207/s15324834basp2702_8
  • Darley, J. M., & Latané, B. (1968). Bystander intervention in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 8, 377–383. doi:10.1037/h0025589
  • Dunkel-Schetter, C., & Skokan, L. A. (1990). Determinants of social support provision in personal relationships. Journal of Social and Personal Relationships, 7, 437–450. doi:10.1177/0265407590074002
  • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12, 1143–1168. doi:10.1111/j.1083-6101.2007.00367.x
  • Fischer, P., Greitemeyer, T., Pollozek, F., & Frey, D. (2006). The unresponsive bystander: Are bystanders more responsive in dangerous emergencies? European Journal of Social Psychology, 36, 267–278. doi:10.1002/ejsp.297
  • Fischer, P., Krueger, J. I., Greitemeyer, T., Vogrincic, C., Kastenmüller, A., Frey, D., ... & Kainbacher, M. (2011). The bystander-effect: A meta-analytic review on bystander intervention in dangerous and non-dangerous emergencies. Psychological Bulletin, 137, 517. doi:10.1037/a0023304
  • Fonseca, A., Brauer, M., Moisuc, A., & Nugier, A. (2013). Cognitive load causes people to react ineffectively to others’ norm transgressions. Journal of Applied Social Psychology, 43, 1518–1527. doi:10.1111/jasp.12145
  • Gini, G., Albiero, P., Benelli, B., & Altoè, G. (2008). Determinants of adolescents’ active defending and passive bystanding behavior in bullying. Journal of Adolescence, 31, 93–105. doi:10.1016/j.adolescence.2007.05.002
  • Hampton, K. N., Goulet, L. S., Marlow, C., & Rainie, L. (2011). Why most Facebook users get more than they give. Washington, DC: Pew Internet and American Life Project. Retrieved from http://www.pewinternet.org/2012/02/03/why-most-facebook-users-get-more-than-they-give/
  • Joinson, A. N. (2001). Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European Journal of Social Psychology, 31, 177–192. doi:10.1002/ejsp.36
  • Kahneman, D. (2003). Maps of bounded rationality: Psychology for behavioral economics. American Economic Review, 93, 1449–1475. doi:10.1257/000282803322655392
  • Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Reese, H. H. (2012). Cyber bullying amongst college students: Evidence from multiple domains of college life. In L. A. Wankel & C. Wankel (Eds.), Misbehavior online in higher education (pp. 293–321). Bingley: Emerald Group Publishing.
  • Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41, S22–S30. doi:10.1016/j.jadohealth.2007.08.017
  • Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in Human Behavior, 28, 434–443. doi:10.1016/j.chb.2011.10.014
  • Latané, B., & Darley, J. M. (1970). The unresponsive bystander: Why doesnt he help? New York, NY: Appleton-Century-Crofts.
  • Latané, B., & Nida, S. (1981). Ten years of research on group size and helping. Psychological Bulletin, 89, 308–324. doi:10.1037/0033-2909.89.2.308
  • Levine, M., & Crowther, S. (2008). The responsive bystander: How social group membership and group size can encourage as well as inhibit bystander intervention. Journal of Personality and Social Psychology, 95, 1429–1439. doi:10.1037/a0012634
  • March, J. G. (1994). A primer on decision making: How decisions happen. New York, NY: The Free Press.
  • Markey, P. (2000). Bystander intervention in computer-mediated communication. Computers in Human Behavior, 16, 183–188. doi:10.1016/S0747-5632(99)00056-4
  • Matsunaga, M. (2010). Testing a mediational model of bullied victims’ evaluation of received support and post-bullying adaptation: A Japan-U.S. cross-cultural comparison. Communication Monographs, 77, 312–340. doi:10.1080/03637751003758235
  • Metzger, M. J., Flanagin, A. J., & Medders, R. B. (2010). Social and heuristic approaches to credibility evaluation online. Journal of Communication, 60, 413–439. doi:10.1111/j.1460-2466.2010.01488.x
  • Milgram, S. (1970). The experience of living in cities. Science, 167, 1461–1468. doi:10.1126/science.167.3924.1461
  • Newman, M. L., Holden, G. W., & Delville, Y. (2005). Isolation and the stress of being bullied. Journal of Adolescence, 28, 343–357. doi:10.1016/j.adolescence.2004.08.002
  • O’Connell, P., Pepler, D., & Craig, W. (1999). Peer involvement in bullying: Insights and challenges for intervention. Journal of Adolescence, 22, 437–452. doi:10.1006/jado.1999.0238
  • Oh, I., & Hazler, R. J. (2009). Contributions of personal and situational factors to bystanders’ reactions to school bullying. School Psychology International, 30, 291–310. doi:10.1177/0143034309106499
  • Olweus, D. (1993). Victimization by peers: Antecedents and long-term outcomes. In K. H. Rubin & J. B. Asendorpf (Eds.), Social withdrawal, inhibition, and shyness in childhood (pp. 315–341). Hillsdale, NJ: Lawrence Erlbaum Associates.
  • Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148–169. doi:10.1177/1541204006286288
  • Rigby, K., & Johnson, B. (2006). Expressed readiness of Australian schoolchildren to act as bystanders in support of children who are being bullied. Educational Psychology, 26, 425–440. doi:10.1080/01443410500342047
  • Salmivalli, C. (1999). Participant role approach to school bullying: Implications for interventions. Journal of Adolescence, 22, 453–459. doi:10.1006/jado.1999.0239
  • Salmivalli, C., & Voeten, M. (2004). Connections between attitudes, group norms, and behaviour in bullying situations. International Journal of Behavioral Development, 28, 246–258. doi:10.1080/01650250344000488
  • Schwartz, S. H., & Gottlieb, A. (1980). Bystander anonymity and reactions to emergencies. Journal of Personality and Social Psychology, 39, 418–430. doi:10.1037/0022-3514.39.3.418
  • Simon, H. (1955). A behavioural model of rational choice. Quarterly Journal of Economics, 69, 99–118. doi:10.2307/1884852
  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154. doi:10.1111/j.1467-9450.2007.00611.x
  • Smith, A., Rainie, L., & Zickuhr, K. (2011). College students and technology. Washington, DC: Pew Internet and American Life Project. Retrieved from http://pewinternet.org/Reports/2011/College-students-and-technology/Report.aspx
  • Solomon, L. Z., Solomon, H., & Maiorca, J. (1982). The effects of bystander's anonymity, situational ambiguity, and victim's status on helping. The Journal of Social Psychology, 117, 285–294. doi:10.1080/00224545.1982.9713438
  • Spears, R., & Lea, M. (1994). Panacea or panopticon? The hidden power in computer-mediated communication. Communication Research, 21, 427–459. doi:10.1177/009365094021004001
  • Sproull, L., & Kiesler, S. (1986). Reducing social context cues: Electronic mail in organizational communication. Management Science, 32, 1492–1512. doi:10.1287/mnsc.32.11.1492
  • Stafford, L., & Daly, J. A. (1984). Conversational memory: The effects of recall mode and memory expectancies on remembrances of natural conversations. Human Communication Research, 10, 379–402. doi:10.1111/j.1468-2958.1984.tb00024.x
  • Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26, 277–287. doi:10.1016/j.chb.2009.11.014
  • Vandebosch, H., & Van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11, 499–503. doi:10.1089/cpb.2007.0042
  • Vangelisti, A. L., & Caughlin, J. P. (1997). Revealing family secrets: The influence of topic, function, and relationships. Journal of Social and Personal Relationships, 14, 679–707. doi:10.1177/0265407597145006
  • Vangelisti, A. L., & Young, S. L. (2000). When words hurt: The effects of perceived intentionality on interpersonal relationships. Journal of Social and Personal Relationships, 17, 393–424. doi:10.1177/0265407500173005
  • Xu, Y., & Burleson, B. R. (2001). Effects of sex, culture, and support type on perceptions of spousal social support: An assessment of the “support gap” hypothesis in early marriage. Human Communication Research, 27, 535–566. doi:10.1111/j.1468-2958.2001.tb00792.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.