1,853
Views
2
CrossRef citations to date
0
Altmetric
Articles

When workplace bullying goes online: construction and validation of the Inventory of Cyberbullying Acts at Work (ICA-W)

ORCID Icon, ORCID Icon, , ORCID Icon &
Pages 28-39 | Received 03 Sep 2016, Accepted 28 Jul 2017, Published online: 08 Aug 2017

References

  • Akaike, H. (1987). Factor analysis and AIC. Psychometrika, 52, 317–332. doi:10.1007/BF02294359
  • Aquino, K., & Thau, S. (2009). Workplace victimization: Aggression from the target’s perspective. Annual Review of Psychology, 60, 717–741. doi:10.1146/annurev.psych.60.110707.163703
  • Asparouhov, T., Muthén, B., & Morin, A. J. (2015). Bayesian structural equation modeling with cross-loadings and residual covariances comments on Stromeyer et al. Journal of Management, 41, 1561–1577. doi:10.1177/0149206315591075
  • Baillien, E., Bollen, K., Euwema, M., & De Witte, H. (2014). Conflicts and conflict management styles as precursors of workplace bullying: A two-wave longitudinal study. European Journal of Work and Organizational Psychology, 23, 511–524. doi:10.1080/1359432X.2012.752899
  • Baillien, E., & De Witte, H. (2009). Why is organizational change related to workplace bullying? Role conflict and job insecurity as mediators. Economic and Industrial Democracy, 30, 348–371. doi:10.1177/0143831X09336557
  • Balducci, C., Cecchin, M., & Fraccaroli, F. (2012). The impact of role stressors on workplace bullying in both victims and perpetrators, controlling for personal vulnerability factors: A longitudinal analysis. Work & Stress, 26, 195–212. doi:10.1080/02678373.2012.714543
  • Barrett, P. (2007). Structural equation modelling: Adjudging model fit. Personality and Individual Differences, 42, 815–824. doi:10.1016/j.paid.2006.09.018
  • Baruch, Y. (2005). Bullying on the net: Adverse behavior on e-mail and its impact. Information & Management, 42, 361–371. doi:10.1016/j.im.2004.02.001
  • Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1, 15–33. doi:10.21913/JSW.v1i2.172
  • Berne, S., Frisén, A., Schultze-Krumbholz, A., Scheithauer, H., Naruskov, K., Luik, P., … Zukauskiene, R. (2013). Cyberbullying assessment instruments: A systematic review. Aggression and Violent Behavior, 18, 320–334. doi:10.1016/j.avb.2012.11.022
  • Berwick, D. M., Murphy, J. M., Goldman, P. A., Ware, J. E., Jr, Barsky, A. J., & Weinstein, M. C. (1991). Performance of a five-item mental health screening test. Medical Care, 29, 169–176. doi:10.1097/00005650-199102000-00008
  • Bonett, D. G., & Wright, T. A. (2000). Sample size requirements for estimating Pearson, Kendall and Spearman correlations. Psychometrika, 65, 23–28. doi:10.1007/BF02294183
  • Bowling, N. A., & Beehr, T. A. (2006). Workplace harassment from the victim’s perspective: A theoretical model and meta-analysis. Journal of Applied Psychology, 91, 998–1012. doi:10.1037/0021-9010.91.5.998
  • Brack, K., & Caltabiano, N. (2014). Cyberbullying and self-esteem in Australian adults. Cyberpsychology. Journal of Psychosocial Research on Cyberspace, 8, article 1. doi:10.5817/CP2014-2-7
  • Brooke, P. P., Jr., Russell, D. W., & Price, J. L. (1988). Discriminant validation of measures of job satisfaction, job involvement, and organizational commitment. Journal of Applied Psychology, 73, 139–145. doi:10.1037/0021-9010.73.2.139
  • Burnham, K. P., & Anderson, D. R. (2002). Model selection and multimodel inference: A practical information-theoretic approach. New York, NY: Springer-Verlag.
  • Byrne, B. M. (2010). Structural equation modeling with AMOS: Basic concepts, applications, and programming (2nd ed.). New York, NY: Routledge/Taylor & Francis Group.
  • Carpenter, J., & Bithell, J. (2000). Bootstrap confidence intervals: When, which, what? A practical guide for medical statisticians. Statistics in Medicine, 19, 1141–1164. doi:10.1002/(SICI)1097-0258(20000515)19:9<1141::AID-SIM479>3.0.CO;2-F
  • Conway, J. M., & Huffcutt, A. I. (2003). A review and evaluation of exploratory factor analysis practices in organizational research. Organizational Research Methods, 6, 147–168. doi:10.1177/1094428103251541
  • Coyne, I., Chong, P. S. L., Seigne, E., & Randall, P. (2003). Self and peer nominations of bullying: An analysis of incident rates, individual differences, and perceptions of the working environment. European Journal of Work and Organizational Psychology, 12, 209–228. doi:10.1080/13594320344000101
  • Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2017). Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A dysempowerment approach. The International Journal of Human Resource Management, 28, 945–972. doi:10.1080/09585192.2015.1116454
  • D’cruz, P., & Noronha, E. (2013). Navigating the extended reach: Target experiences of cyberbullying at work. Information and Organization, 23, 324–343. doi:10.1016/j.infoandorg.2013.09.001
  • De Hoogh, A. H. B., Den Hartog, D. N., & Koopman, P. L. (2004). De ontwikkeling van de CLIO: een vragenlijst voor charismatisch leiderschap in organisaties. Gedrag en Organisatie, 17, 354–381.
  • De Keyser, V., & Hansez, I. (2000). WOCCQ: Working conditions and control Questionnaire. Liège: Université de Liège.
  • Dooley, J. J., Pyżalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. Journal of Psychology, 217, 182–188. doi:10.1027/0044-3409.217.4.182
  • Efron, B., & Tibshirani, R. J. (1993). An introduction to the bootstrap. Boca Raton, FL: Chapman & Hall.
  • Einarsen, S. (1999). The nature and causes of bullying at work. International Journal of Manpower, 20, 16–27. doi:10.1108/01437729910268588
  • Einarsen, S. (2000). Harassment and bullying at work: A review of the scandinavian approach. Aggression and Violent Behavior, 5, 371–401. doi:10.1016/S1359-1789(98)00043-3
  • Einarsen, S., Hoel, H., & Notelaers, G. (2009). Measuring exposure to bullying and harassment at work: Validity, factor structure and psychometric properties of the Negative Acts Questionnaire-Revised. Work & Stress, 23, 24–44. doi:10.1080/02678370902815673
  • Einarsen, S., Raknes, B. I., & Matthiesen, S. B. (1994). Bullying and harassment at work and their relationships to work environment quality: An exploratory study. European Work and Organizational Psychology, 4, 381–401. doi:10.1080/13594329408410497
  • Fabrigar, L. R., Wegener, D. T., MacCallum, R. C., & Strahan, E. J. (1999). Evaluating the use of exploratory factor analysis in psychological research. Psychological Methods, 4, 272–299. doi:10.1037/1082-989X.4.3.272
  • Farley, S., Coyne, I., Axtell, C., & Sprigg, C. (2016). Design, development and validation of a workplace cyberbullying measure, the WCM. Work & Stress, 30, 293–317. doi:10.1080/02678373.2016.1255998
  • Farley, S., Coyne, I., Sprigg, C., Axtell, C., & Subramanian, G. (2015). Exploring the impact of workplace cyberbullying on trainee doctors. Medical Education, 49, 436–443. doi:10.1111/medu.12666
  • Galanaki, E., & Papalexandris, N. (2013). Measuring workplace bullying in organisations. The International Journal of Human Resource Management, 24, 2107–2130. doi:10.1080/09585192.2012.725084
  • Gardner, D., O’Driscoll, M., Cooper-Thomas, H. D., Roche, M., Bentley, T., Catley, B., … Trenberth, L. (2016). Predictors of workplace bullying and cyber-bullying in New Zealand. International Journal of Environmental Research and Public Health, 13, 448–462. doi:10.3390/ijerph13050448
  • Gini, G., & Pozzoli, T. (2009). Association between bullying and psychosomatic problems: A meta-analysis. Pediatrics, 123, 1059–1065. doi:10.1542/peds.2008-1215
  • Grigg, D. W. (2010). Cyber-aggression: Definition and concept of cyberbullying. Australian Journal of Guidance and Counselling, 20, 143–156. doi:10.1375/ajgc.20.2.143
  • Hill, E. J., Miller, B. C., Weiner, S. P., & Colihan, J. (1998). Influences of the virtual office on aspects of work and work/life balance. Personnel Psychology, 51, 667–683. doi:10.1111/j.1744-6570.1998.tb00256.x
  • Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14, 206–221. doi:10.1080/13811118.2010.494133
  • Hinkin, T. R. (2005). Scale development principles and practices. In R. A. Swanson & E. F. Holton (Eds.), Research in organizations: Foundations and methods of inquiry (pp. 161–179). San Francisco, CA: Berrett-Koehler.
  • Hinton, P. R., Brownlow, C., McMurray, I., & Cozens, B. (2004). SPSS explained. East Sussex, UK: Routledge.
  • Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6, 1–55. doi:10.1080/10705519909540118
  • Jehn, K. A. (1995). A multimethod examination of the benefits and detriments of intragroup conflict. Administrative Science Quarterly, 40, 256–282. doi:10.2307/2393638
  • Kokubun, S. (2007). Abusive behavior at work: A cross-cultural comparison between the United States and Japan (Doctoral dissertation). San Diego, CA: Alliant International University.
  • Korunka, C., & Hoonakker, P. (Eds.). (2014). The impact of ICT on quality of working life. Dordrecht: Springer.
  • Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140, 1073–1137. doi:10.1037/a0035618
  • Leymann, H. (1996). The content and development of mobbing at work. European Journal of Work and Organizational Psychology, 5, 165–184. doi:10.1080/13594329608414853
  • Lim, V. K., & Teo, T. S. (2009). Mind your E-manners: Impact of cyber incivility on employees’ work attitude and behavior. Information & Management, 46, 419–425. doi:10.1016/j.im.2009.06.006
  • Magley, V. J., Hulin, C. L., Fitzgerald, L. F., & DeNardo, M. (1999). Outcomes of self-labeling sexual harassment. Journal of Applied Psychology, 84, 390–402. doi:10.1037/0021-9010.84.3.390
  • Menesini, E., Nocentini, A., & Calussi, P. (2011). The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, Behavior, and Social Networking, 14, 267–274. doi:10.1089/cyber.2010.0002
  • Mikkelsen, E. G., & Einarsen, S. (2001). Bullying in Danish work-life: Prevalence and health correlates. European Journal of Work and Organizational Psychology, 10, 393–413. doi:10.1080/13594320143000816
  • Millard, B., & Machin, A. (2007). Characteristics of public sector workers. Economic and Labour Market Review, 1, 46–55. doi:10.1057/palgrave.elmr.1410075
  • Mitchell, K. J., Ybarra, M., & Finkelhor, D. (2007). The relative importance of online victimization in understanding depression, delinquency, and substance use. Child Maltreatment, 12, 314–324. doi:10.1177/1077559507305996
  • Modecki, K. L., Minchin, J., Harbaugh, A. G., Guerra, N. G., & Runions, K. C. (2014). Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. Journal of Adolescent Health, 55, 602–611. doi:10.1111/1467-9450.00307
  • Muthén, L. K., & Muthén, B. O. (2015). Mplus user’s guide (7th ed.). Los Angeles, CA: Muthén & Muthén.
  • Nielsen, M. B., Matthiesen, S. B., & Einarsen, S. (2010). The impact of methodological moderators on prevalence rates of workplace bullying. A meta‐analysis. Journal of Occupational and Organizational Psychology, 83, 955–979. doi:10.1348/096317909X481256
  • Nielsen, M. B., Notelaers, G., & Einarsen, S. (2011). Measuring exposure to workplace bullying. In S. Einarsen, H. Hoel, D. Zapf, & C. L. Cooper (Eds.), Bullying and harassment in the workplace: Developments in theory, research, and practice (pp. 149–174). Boca Raton, FL: CRC Press.
  • Norman, G. (2010). Likert scales, levels of measurement and the “laws” of statistics. Advances in Health Sciences Education, 15, 625–632. doi:10.1007/s10459-010-9222-y
  • Notelaers, G., De Witte, H., & Einarsen, S. (2010). A job characteristics approach to explain workplace bullying. European Journal of Work and Organizational Psychology, 19, 487–504. doi:10.1080/13594320903007620
  • Notelaers, G., De Witte, H., Van Veldhoven, M., & Vermunt, J. K. (2007). Construction and validation of the short inventory to monitor psychosocial hazards. Arbeidsgezondheidszorg En Ergonomie, 44, 11–17.
  • Notelaers, G., & Einarsen, S. (2008, June 4–6). The construction and validity of the Short-Negative Acts Questionnaire. Paper presented at The 6th International Conference on Workplace Bullying, Montréal, Canada.
  • Notelaers, G., & Einarsen, S. (2013). The world turns at 33 and 45: Defining simple cutoff scores for the Negative Acts Questionnaire–Revised in a representative sample. European Journal of Work and Organizational Psychology, 22, 670–682. doi:10.1080/1359432X.2012.690558
  • O’Driscoll, M., Bentley, T., Catley, B., Cooper-Thomas, H., Gardner, D., Roche, M., … Trenberth, L. (2015). Workplace bullying and cyberbullying in New Zeeland. Paper presented at European Association of Work and Organizational Psychology 2015 Conference, Oslo, Norway.
  • Olweus, D. (2012). Cyberbullying: An overrated phenomenon? European Journal of Developmental Psychology, 9, 520–538. doi:10.1080/17405629.2012.682358
  • Olweus, D. (2013). School bullying: Development and some important challenges. Annual Review of Clinical Psychology, 9, 751–780. doi:10.1146/annurev-clinpsy-050212-185516
  • Perren, S., Dooley, J., Shaw, T., & Cross, D. (2010). Bullying in school and cyberspace: Associations with depressive symptoms in Swiss and Australian adolescents. Child and Adolescent Psychiatry and Mental Health, 4, 1–10. doi:10.1186/1753-2000-4-28
  • Privitera, C., & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bullying? CyberPsychology & Behavior, 12, 395–400. doi:10.1089/cpb.2009.0025
  • Salin, D., & Hoel, H. (2010). Organisational causes of workplace bullying. In S. Einarsen, H. Hoel, D. Zapf, & C. L. Cooper (Eds.), Bullying and emotional abuse in the workplace. International perspectives in research and practice (pp. 227–244). London: Taylor & Francis.
  • Samnani, A. K., & Singh, P. (2012). 20 years of workplace bullying research: A review of the antecedents and consequences of bullying in the workplace. Aggression and Violent Behavior, 17, 581–589. doi:10.1016/j.avb.2012.08.004
  • Simons, S. R., Stark, R. B., & DeMarco, R. F. (2011). A new, four‐item instrument to measure workplace bullying. Research in Nursing & Health, 34, 132–140. doi:10.1002/nur.20422
  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154. doi:10.1111/j.1467-9450.2007.00611.x
  • Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385. doi:10.1111/j.1469-7610.2007.01846.x
  • Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., … Henenius, H. (2010). Psychosocial risk factors associated with cyberbullying among adolescents. Archives of General Psychiatry, 67, 720–728. doi:10.1001/archgenpsychiatry.2010.79
  • Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online victimization? Effects of victim’s personality and properties of the incident. European Journal of Developmental Psychology, 9, 260–274. doi:10.1080/17405629.2011.643170
  • Tabachnick, B. G., & Fidell, L. S. (2001). Using multivariate statistics. Boston, MA: Allyn and Bacon.
  • Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26, 277–287. doi:10.1016/j.chb.2009.11.014
  • van Beest, I., & Williams, K. D. (2006). When inclusion costs and ostracism pays, ostracism still hurts. Journal of Personality and Social Psychology, 91, 918–928. doi:10.1037/0022-3514.91.5.918
  • Van den Bossche, S., Taris, T., Houtman, I., Smulders, P., & Kompier, M. (2013). Workplace violence and the changing nature of work in Europe: Trends and risk groups. European Journal of Work and Organizational Psychology, 22, 588–600. doi:10.1080/1359432X.2012.690557
  • Van den Brande, W., Baillien, E., De Witte, H., Vander Elst, T., & Godderis, L. (2016). The role of work stressors, coping strategies and coping resources in the process of workplace bullying: A systematic review and development of a comprehensive model. Aggression and Violent Behavior, 29, 61–71. doi:10.1016/j.avb.2016.06.004
  • Vandebosch, H., & van Cleemput, K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. Cyber Psychology & Behavior, 11, 499–503. doi:10.1089/cpb.2007.0042
  • Vander Elst, T., De Witte, H., & De Cuyper, N. (2014). The Job Insecurity Scale: A psychometric evaluation across five European countries. European Journal of Work and Organizational Psychology, 23, 364–380. doi:10.1080/1359432X.2012.745989
  • Velicer, W. F., & Fava, J. L. (1998). Affects of variable and subject sampling on factor pattern recovery. Psychological Methods, 3, 231–251. doi:10.1037/1082-989X.3.2.231
  • Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & De Witte, H. (2017). The dark side of working online: Towards a definition and an Emotion Reaction model of workplace cyberbullying. Computers in Human Behavior, 69, 324–334. doi:10.1016/j.chb.2016.12.055
  • Wajcman, J., & Rose, E. (2011). Constant connectivity: Rethinking interruptions at work. Organization Studies, 32, 941–961. doi:10.1177/0170840611410829
  • Wingate, V. S., Minney, J. A., & Guadagno, R. E. (2013). Sticks and stones may break your bones, but words will always hurt you: A review of cyberbullying. Social Influence, 8, 87–106. doi:10.1080/15534510.2012.730491
  • Worthington, R. L., & Whittaker, T. A. (2006). Scale development research a content analysis and recommendations for best practices. The Counseling Psychologist, 34, 806–838. doi:10.1177/0011000006288127

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.