607
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Applying Routine Activities Theory to Assess On and Offline Bullying Victimization among Australian Youth

, , , &
Pages 1-13 | Received 17 Feb 2022, Accepted 19 Aug 2022, Published online: 05 Sep 2022

References

  • Arseneault, L., Walsh, E., Trzesniewski, K., Newcombe, R., Caspi, A., & Moffitt, T. E. (2006). Bullying victimization uniquely contributes to adjustment problems in young children: A nationally representative cohort study. Pediatrics, 118(1), 130–138. https://doi.org/10.1542/peds.2005-2388
  • Barnes, S. E., Howell, K. H., & Miller-Graff, L. E. (2016). The relationship between polyvictimization, emotion dysregulation, and social support among emerging adults victimized during childhood. Journal of Aggression, Maltreatment & Trauma, 25(5), 470–486. https://doi.org/10.1080/10926771.2015.1133749
  • Blosnich, J., & Bossarte, R. (2011). Low-level violence in schools: Is there an association between school safety measures and peer victimization? Journal of School Health, 81(2), 107–113. https://doi.org/10.1111/j.1746-1561.2010.00567.x
  • Bossler, A. M., & Holt, T. J. (2009). On-line activities, guardianship, and malware infection: An examination of routine activities theory International Journal of Cyber Criminology. 3(1), 21. http://cybercrimejournal.com/bosslerholtjan2009.htm
  • Bossler, A. M., Holt, T. J., & May, D. C. (2012). Predicting online harassment victimization among a Juvenile population. Youth & Society, 44(4), 500–523. https://doi.org/10.1177/0044118X11407525
  • Burrow, J. D., & Apel, R. (2008). Youth behavior, school structure, and student risk of victimization. Justice Quarterly, 25(2), 349–380. https://doi.org/10.1080/07418820802025181
  • Carbone-Lopez, K., Esbensen, F.-A., & Brick, B. T. (2010). Correlates and consequences of peer victimization: Gender differences in direct and indirect forms of bullying. Youth Violence and Juvenile Justice, 8(4), 332–350. https://doi.org/10.1177/1541204010362954
  • Chan, T. K. H., Cheung, C. M. K., & Lee, Z. W. Y. (2021). Cyberbullying on social networking sites: A literature review and future research directions. Information & Management, 58(2), 103411. https://doi.org/10.1016/j.im.2020.103411
  • Chen, L., Ho, S. S., & Lwin, M. O. (2017). A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media & Society, 19(8), 1194–1213. https://doi.org/10.1177/1461444816634037
  • Cho, S. (2017). Self-control and risky lifestyles in context: Cross-level integration between opportunity and collective efficacy in the study of peer victimization among South Korean youth. Journal of Child and Family Studies, 26(1), 67–79. https://doi.org/10.1007/s10826-016-0554-y
  • Cho, S. (2019). Bullying victimization-perpetration link during early adolescence in South Korea: Applying the individual trait approach and opportunity perspective. Journal of School Violence, 18(2), 285–299. https://doi.org/10.1080/15388220.2018.1483246
  • Chou, W.-J., Liu, T.-L., Yang, P., Yen, C.-F., & Hu, H.-F. (2018). Bullying victimization and perpetration and their correlates in adolescents clinically diagnosed with ADHD. Journal of Attention Disorders, 22(1), 25–34. https://doi.org/10.1177/1087054714558874
  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588. https://doi.org/10.2307/2094589
  • Cosma, A., Walsh, S. D., Chester, K. L., Callaghan, M., Molcho, M., Craig, W., & Pickett, W. (2020). Bullying victimization: Time trends and the overlap between traditional and cyberbullying across countries in Europe and North America. International Journal of Public Health, 65(1), 75–85. https://doi.org/10.1007/s00038-019-01320-2
  • Cross, D., Lester, L., & Barnes, A. (2015). A longitudinal study of the social and emotional predictors and consequences of cyber and traditional bullying victimisation. International Journal of Public Health, 60(2), 207–217. https://doi.org/10.1007/s00038-015-0655-1
  • Dehue, F., Bolman, C., & Völlink, T. (2008). Cyberbullying: Youngsters’ experiences and parental perception. CyberPsychology & Behavior, 11(2), 217–223. https://doi.org/10.1089/cpb.2007.0008
  • Due, P., & Holstein, B. E. (2008). Bullying victimization among 13 to 15 year old school children: Results from two comparative studies in 66 countries and regions. International Journal of Adolescent Medicine and Health, 20(2), 209–221. https://doi.org/10.1515/IJAMH.2008.20.2.209
  • Eliot, M., Cornell, D., Gregory, A., & Fan, X. (2010). Supportive school climate and student willingness to seek help for bullying and threats of violence. Journal of School Psychology, 48(6), 533–553. https://doi.org/10.1016/j.jsp.2010.07.001
  • Farina, K. A. (2019). Promoting a culture of bullying: Understanding the role of school climate and school sector. Journal of School Choice, 13(1), 94–120. https://doi.org/10.1080/15582159.2018.1526615
  • Gerlinger, J., & Wo, J. C. (2016). Preventing school bullying: Should schools prioritize an authoritative school discipline approach over security measures? Journal of School Violence, 15(2), 133–157. https://doi.org/10.1080/15388220.2014.956321
  • Gibson, C. L. (2012). An investigation of neighborhood disadvantage, low Self-control, and violent victimization among youth. Youth Violence and Juvenile Justice, 10(1), 41–63. https://doi.org/10.1177/1541204011423767
  • Gottfredson, M. R., & Travis, H. (1990). A general theory of crime. Stanford University Press.
  • Hase, C. N., Goldberg, S. B., Smith, D., Stuck, A., & Campain, J. (2015). Impacts of traditional bullying and cyberbullying on the mental health of middle school and high school students: Impacts of traditional bullying and cyberbullying. Psychology in the Schools, 52(6), 607–617. https://doi.org/10.1002/pits.21841
  • Hemphill, S. A., Heerde, J. A., & Gomo, R. (2014). A conceptual definition of school-based bullying for the Australian research and academic community. Australian Research Alliance for Children and Youth.
  • Hemphill, S. A., Tollit, M., Kotevski, A., & Heerde, J. A. (2015). Predictors of traditional and cyber-bullying victimization: A longitudinal study of Australian secondary school students. Journal of Interpersonal Violence, 30(15), 2567–2590. https://doi.org/10.1177/0886260514553636
  • Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129–156. https://doi.org/10.1080/01639620701457816
  • Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14(3), 206–221. https://doi.org/10.1080/13811118.2010.494133
  • Holt, T. J., & Bossler, A. M. (2008). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30(1), 1–25. https://doi.org/10.1080/01639620701876577
  • Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
  • Holt, M. K., & Espelage, D. L. (2012). Cyberbullying victimization: Associations with other victimization forms and psychological distress. Missouri Law Review, 77(3), 641–652. https://scholarship.law.missouri.edu/mlr/vol77/iss3/4
  • Holt, T. J., Fitzgerald, S., Bossler, A. M., Chee, G., & Ng, E. (2016). Assessing the risk factors of cyber and mobile phone bullying victimization in a nationally representative sample of Singapore youth. International Journal of Offender Therapy and Comparative Criminology, 60(5), 598–615. https://doi.org/10.1177/0306624X14554852
  • Holt, T. J., Turner, M. G., & Lyn Exum, M. (2014). The impact of self control and neighborhood disorder on bullying victimization. Journal of Criminal Justice, 42(4), 347–355. https://doi.org/10.1016/j.jcrimjus.2014.04.004
  • Janssen, I., Craig, W. M., Boyce, W. F., & Pickett, W. (2004). Associations between overweight and obesity with bullying behaviors in school-aged children. Pediatrics, 113(5), 1187–1194. https://doi.org/10.1542/peds.113.5.1187
  • Jo, Y., & Lee, B. (2018). Self-control, risky lifestyles, and violent victimization: A longitudinal study of the youth in South Korea. International Journal of Law, Crime and Justice, 55, 27–39. https://doi.org/10.1016/j.ijlcj.2018.09.001
  • Kelly, E. V., Newton, N. C., Stapinski, L. A., & Teesson, M. (2018). Prospective associations between personality and bullying among Australian adolescents. Australian & New Zealand Journal of Psychiatry, 52(2), 173–180. https://doi.org/10.1177/0004867417726583
  • Khong, J. Z. N., Tan, Y. R., Elliott, J. M., Fung, D. S. S., Sourander, A., & Ong, S. H. (2020). Traditional Victims and Cybervictims: Prevalence, Overlap, and Association with Mental Health among Adolescents in Singapore. School Mental Health, 12(1), 145–155. https://doi.org/10.1007/s12310-019-09337-x
  • Kowalski, R. M., & Fedina, C. (2011). Cyberbullying in ADHD and Asperger Syndrome populations. Research in Autism Spectrum Disorders, 5(3), 1201–1208. https://doi.org/10.1016/j.rasd.2011.01.007
  • Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073–1137. https://doi.org/10.1037/a0035618
  • Kubiszewski, V., Fontaine, R., Potard, C., & Auzoult, L. (2015). Does cyberbullying overlap with school bullying when taking modality of involvement into account? Computers in Human Behavior, 43, 49–57. https://doi.org/10.1016/j.chb.2014.10.049
  • Kulig, T. C., Pratt, T. C., Cullen, F. T., Chouhy, C., & Unnever, J. D. (2017). Explaining bullying victimization: Assessing the generality of the low self-control/risky lifestyle model. Victims & Offenders, 12(6), 891–912. https://doi.org/10.1080/15564886.2017.1307297
  • Kuntsche, E., Pickett, W., Overpeck, M., Craig, W., Boyce, W., & De Matos, M. G. (2006). Television viewing and forms of bullying among adolescents from eight countries. Journal of Adolescent Health, 39(6), 908–915. https://doi.org/10.1016/j.jadohealth.2006.06.007
  • Kupchik, A., & Farina, K. A. (2016). Imitating authority: Students’ perceptions of school punishment and security, and bullying victimization. Youth Violence and Juvenile Justice, 14(2), 147–163. https://doi.org/10.1177/1541204014557648
  • Mamun, A. A., O’Callaghan, M. J., Williams, G. M., & Najman, J. M. (2013). Adolescents bullying and young adults body mass index and obesity: A longitudinal study. International Journal of Obesity, 37(8), 1140–1146. https://doi.org/10.1038/ijo.2012.182
  • Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2010). Potential factors of online victimization of youth: An examination of adolescent online behaviors utilizing routine activity theory. Deviant Behavior, 31(5), 381–410. https://doi.org/10.1080/01639620903004903
  • Mazefsky, C. A., Herrington, J., Siegel, M., Scarpa, A., Maddox, B. B., Scahill, L., & White, S. W. (2013). The role of emotion regulation in autism spectrum disorder. Journal of the American Academy of Child and Adolescent Psychiatry, 52(7), 679–688. https://doi.org/10.1016/j.jaac.2013.05.006
  • Mesch, G. S. (2009). Parental mediation, online activities, and cyberbullying. CyberPsychology & Behavior, 12(4), 387–393. https://doi.org/10.1089/cpb.2009.0068
  • Montes, G., & Halterman, J. S. (2007). Bullying among children with autism and the influence of comorbidity with ADHD: A population-based study. Ambulatory Pediatrics, 7(3), 253–257. https://doi.org/10.1016/j.ambp.2007.02.003
  • Navarro, J. N., & Jasinski, J. L. (2012). Going cyber: Using routine activities theory to predict cyberbullying experiences. Sociological Spectrum, 32(1), 81–94. https://doi.org/10.1080/02732173.2012.628560
  • Ngo, F. T. (2011). Cybercrime victimization: An examination of individual and situational level factors International Journal of Cyber Criminology. 5(1), 21. https://www.cybercrimejournal.com/previousissueijcc.html
  • Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5(1), 773. https://www.cybercrimejournal.com/previousissueijcc.html
  • Olenik-Shemesh, D., & Heiman, T. (2017). Cyberbullying victimization in adolescents as related to body esteem, social support, and social self-efficacy. The Journal of Genetic Psychology, 178(1), 28–43. https://doi.org/10.1080/00221325.2016.1195331
  • Pearce, M. J., Boergers, J., & Prinstein, M. J. (2002). Adolescent obesity, overt and relational peer victimization, and romantic relationships. Obesity Research, 10(5), 386–393. https://doi.org/10.1038/oby.2002.53
  • Peguero, A. A., Popp, A. M., & Koo, D. J. (2015). Race, ethnicity, and school-based adolescent victimization. Crime and Delinquency, 61(3), 323–349. https://doi.org/10.1177/0011128711398021
  • Perkins, H. W., Perkins, J. M., & Craig, D. W. (2014). No safe haven: Locations of harassment and bullying victimization in middle schools. Journal of School Health, 84(12), 810–818. https://doi.org/10.1111/josh.12208
  • Popp, A. M. (2012). The effects of exposure, proximity, and capable guardians on the risk of bullying victimization. Youth Violence and Juvenile Justice, 10(4), 315–332. https://doi.org/10.1177/1541204011434833
  • Pratt, T. C., & Cullen, F. T. (2005). Assessing macro-level predictors and theories of crime: A meta-analysis. Crime and Justice, 32, 373–450. https://doi.org/10.1086/655357
  • Puhl, R. M., & King, K. M. (2013). Weight discrimination and bullying. Best Practice & Research. Clinical Endocrinology & Metabolism, 27(2), 117–127. https://doi.org/10.1016/j.beem.2012.12.002
  • Reingle Gonzalez, J. M., Jetelina, K. K., & Jennings, W. G. (2016). Structural school safety measures, SROs, and school-related delinquent behavior and perceptions of safety: A state-of-the-art review. Policing: An International Journal of Police Strategies & Management, 39(3), 438–454. https://doi.org/10.1108/PIJPSM-05-2016-0065
  • Reyns, B. W., Henson, B., & Fisher, B. S. (2011). Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior, 38(11), 1149–1169. https://doi.org/10.1177/0093854811421448
  • Rose, C. A., Monda-Amaya, L. E., & Espelage, D. L. (2011). Bullying perpetration and victimization in special education: A review of the literature. Remedial and Special Education, 32(2), 114–130. https://doi.org/10.1177/0741932510361247
  • Sasse, S. (2005). “Motivation” and routine activities theory. Deviant Behavior, 26(6), 547–570. https://doi.org/10.1080/01639620500218260
  • Sbarbaro, V., & Smith, T. M. E. (2011). An exploratory study of bullying and cyberbullying behaviors among economically/educationally disadvantaged middle school students. American Journal of Health Studies, 26(3), 139–151.
  • Schwalbach, J., & DeAngelis, C. A. (2020). School sector and school safety: A review of the evidence. Educational Review, 74(4), 1–17. https://doi.org/10.1080/00131911.2020.1822789
  • Selkie, E. M., Fales, J. L., & Moreno, M. A. (2016). Cyberbullying prevalence among US middle and high school–aged adolescents: A systematic review and quality assessment. Journal of Adolescent Health, 58(2), 125–133. https://doi.org/10.1016/j.jadohealth.2015.09.026
  • Shaw, T., & Cross, D. (2012). The clustering of bullying and cyberbullying behaviour within Australian schools. Australian Journal of Education, 56(2), 142–162. https://doi.org/10.1177/000494411205600204
  • Shaw, P., Stringaris, A., Nigg, J., & Leibenluft, E. (2014). Emotion dysregulation in attention deficit hyperactivity disorder. American Journal of Psychiatry, 171(3), 276–293. https://doi.org/10.1176/appi.ajp.2013.13070966
  • Snyder, J. A. (2015). The link between ADHD and the risk of sexual victimization among college women: Expanding the lifestyles/routine activities framework. Violence Against Women, 21(11), 1364–1384. https://doi.org/10.1177/1077801215593647
  • Snyder, J. A. (2019). Examining the link between assault victimization and ADHD among college men. Criminal Justice Studies, 32(1), 16–31. https://doi.org/10.1080/1478601X.2018.1555159
  • Tanner-Smith, E. E., Fisher, B. W., Addington, L. A., & Gardella, J. H. (2018). Adding security, but subtracting safety? Exploring schools’ use of multiple visible security measures. American Journal of Criminal Justice, 43(1), 102–119. https://doi.org/10.1007/s12103-017-9409-3
  • Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277–287. https://doi.org/10.1016/j.chb.2009.11.014
  • Turner, I., Reynolds, K. J., Lee, E., Subasic, E., & Bromhead, D. (2014). Well-being, school climate, and the social identity process: A latent growth model study of bullying perpetration and peer victimization. School Psychology Quarterly, 29(3), 320. https://doi.org/10.1037/spq0000074
  • Turner, H. A., Shattuck, A., Finkelhor, D., & Hamby, S. (2017). Effects of poly-victimization on adolescent social support, self-concept, and psychological distress. Journal of Interpersonal Violence, 32(5), 755–780. https://doi.org/10.1177/0886260515586376
  • Twyman, K. A., Saylor, C. F., Saia, D., Macias, M. M., Taylor, L. A., & Spratt, E. (2010). Bullying and Ostracism Experiences in Children with Special Health Care Needs. Journal of Developmental & Behavioral Pediatrics, 31(1), 1–8. htttps://doi.org/10.1097/DBP.0b013e3181c828c8
  • Unnever, J. D., & Cornell, D. G. (2003). Bullying, self-control, and adhd. Journal of Interpersonal Violence, 18(2), 129–147. https://doi.org/10.1177/0886260502238731
  • Urberg, K. A., Değirmencioğlu, S. M., Tolson, J. M., & Halliday-Scher, K. (1995). The structure of adolescent peer networks. Developmental Psychology, 31(4), 540. https://doi.org/10.1037/0012-1649.31.4.540
  • Van Geel, M., Vedder, P., & Tanilon, J. (2014). Are overweight and obese youths more often bullied by their peers? A meta-analysis on the relation between weight status and bullying. International Journal of Obesity, 38(10), 1263–1267. https://doi.org/10.1038/ijo.2014.117
  • Waasdorp, T. E., & Bradshaw, C. P. (2015). The overlap between cyberbullying and traditional bullying. Journal of Adolescent Health, 56(5), 483–488. https://doi.org/10.1016/j.jadohealth.2014.12.002
  • Wang, J., Iannotti, R. J., & Luk, J. W. (2010). Bullying victimization among underweight and overweight U.S. youth: Differential associations for boys and girls. Journal of Adolescent Health, 47(1), 99–101. https://doi.org/10.1016/j.jadohealth.2009.12.007
  • Weinstein, M., Jensen, M. R., & Tynes, B. M. (2021). Victimized in many ways: Online and offline bullying/harassment and perceived racial discrimination in diverse racial–ethnic minority adolescents. Cultural Diversity & Ethnic Minority Psychology, 27(3), 397–407. https://doi.org/10.1037/cdp0000436
  • Wiener, J., & Mak, M. (2009). Peer victimization in children with attention-deficit/hyperactivity disorder. Psychology in the Schools, 46(2), 116–131. https://doi.org/10.1002/pits.20358
  • World Health Organization. (2016). Bullying and physical fights among adolescents, World Health Organization Regional Office for Europe.
  • Zych, I., Farrington, D. P., & Ttofi, M. M. (2019). Protective factors against bullying and cyberbullying: A systematic review of meta-analyses. Aggression and Violent Behavior, 45, 4–19. https://doi.org/10.1016/j.avb.2018.06.008
  • Zych, I., Ortega-Ruiz, R., & Del Rey, R. (2015). Scientific research on bullying and cyberbullying: Where have we been and where are we going. Aggression and Violent Behavior, 24, 188–198. https://doi.org/10.1016/j.avb.2015.05.015

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.