958
Views
25
CrossRef citations to date
0
Altmetric
Cyberbullying: Development, consequences, risk and protective factors

Recalling unpresented hostile words: False memories predictors of traditional and cyberbullying

, , &
Pages 182-194 | Published online: 07 Mar 2012

References

  • Anderson , C. A. and Bushman , B. J. 2001 . Effects of violent video games on aggressive behavior, aggressive cognition, aggressive affect, physiological arousal, and prosocial behavior: A meta-analytic review of the scientific literature . Psychological Science , 12 ( 5 ) : 353 – 359 .
  • Anderson , C. A. and Bushman , B. J. 2002 . Human aggression . Annual Review of Psychology , 53 : 27 – 51 .
  • Björkqvist , K. , Lagerspetz , K. and Kaukiainen , A. 1992 . Do girls manipulate and boys fight? Developmental trends in regard to direct and indirect aggression . Aggressive Behavior , 18 : 117 – 127 .
  • Boulton , M. J. and Smith , P. K. 1994 . Bully/victim problems in middle-school children: Stability, self-perceived competence, peer perceptions, and peer acceptance . British Journal of Developmental Psychology , 12 : 315 – 329 .
  • Camodeca , M. and Goossens , F. A. 2005 . Aggression, social cognitions, anger and sadness in bullies and victims . Journal of Child Psychology and Psychiatry , 46 ( 2 ) : 186 – 197 .
  • Crick , N. R. and Dodge , K. A. 1994 . A review and reformulation of social information-processing mechanisms in children's social adjustment . Psychological Bulletin , 115 ( 1 ) : 74 – 101 .
  • Deese , J. 1959 . On the prediction of occurrence of particulate verbal intrusions in immediate recall . Journal of Experimental Psychology , 58 : 17 – 22 .
  • Dill , K. E. , Anderson , C. A. , Anderson , K. B. and Deuser , W. E. 1997 . Effects of aggressive personality on social expectations and social perceptions . Journal of Research in Personality , 31 : 272 – 292 .
  • Dooley , J. J. , Pyzalski , J. and Cross , D. 2009 . Cyberbullying versus face-to-face bullying: A theoretical and conceptual review . Zeitschrift für Psychologie/Journal of Psychology , 217 ( 4 ) : 182 – 189 .
  • Gini , G. 2006 . Social cognition and moral cognition in bullying: What's wrong? . Aggressive Behavior , 32 ( 6 ) : 528 – 539 .
  • Gradinger , P. , Strohmeier , D. and Spiel , C. 2009 . Traditional bullying and cyberbullying: Identification of risks groups for adjustment problems . Zeitschrift für Psychologie/Journal of Psychology , 217 ( 4 ) : 205 – 213 .
  • Hu , L. and Bentler , P. M. 1999 . Cut-off criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives . Structural Equation Modeling , 6 : 1 – 55 .
  • Menesini , E. , Calussi , P. and Nocentini , A. 2012 . “ Cyberbullying and traditional bullying: Unique, addictive and synergistic effects on psychological health symptoms ” . In Cyberbullying in the global playground: Research from international perspectives , Edited by: Li , Q. , Cross , D. and Smith , P. Oxford , UK : Wiley-Blackwell . (pp. 245–262)
  • Menesini , E. , Nocentini , A. and Calussi , P. 2011 . The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination . Cyberpsychology, Behavior and Social Networking , 14 ( 5 ) : 267 – 274 .
  • Muthen , L. K. and Muthen , B. O. 2006 . Mplus user's guide , Los Angeles , CA : Author .
  • Olweus , D. 1993 . Bullying at school: What we know and what we can do , Cambridge , MA : Blackwell .
  • Orobio de Castro , B. , Veerman , J. W. , Koops , W. , Bosch , J. D. and Monshouwer , H. J. 2002 . Hostile attribution of intent and aggressive behavior: A meta-analysis . Child Development , 73 ( 3 ) : 916 – 934 .
  • Pornari , C. D. and Wood , J. 2010 . Peer and cyber aggression in secondary school students: The role of moral disengagement, hostile attribution bias, and outcome expectancies . Aggressive Behavior , 36 ( 2 ) : 81 – 94 .
  • Reyna , V. F. and Brainerd , C. J. 1995 . Fuzzy-trace theory: An interim synthesis . Learning and Individual Differences , 7 ( 1 ) : 1 – 75 .
  • Rigby , K. 1997 . Bullying in schools, and what to do about it , London , UK : Jessica Kingsley .
  • Roediger , H. L. and McDermott , K. B. 1995 . Creating false memories: Remembering words not presented in lists . Journal of Experimental Psychology: Learning, Memory, and Cognition , 21 ( 4 ) : 803 – 814 .
  • Salmivalli , C. 2010 . Bullying and the peer group: A review . Aggression and Violent Behavior , 15 ( 2 ) : 112 – 120 .
  • Schacter , D. L. , Norman , K. A. and Koutstaal , W. 1998 . The cognitive neuroscience of constructive memory . Annual Review of Psychology , 49 : 289 – 318 .
  • Smith , P. K. , Mahdavi , J. , Carvalho , M. , Fisher , S. , Russell , S. and Tippett , N. 2008 . Cyberbullying: Its nature and impact in secondary school pupils . Journal of Child Psychology and Psychiatry , 49 ( 4 ) : 376 – 385 .
  • Sutton , J. , Smith , P. K. and Swettenham , J. 1999 . Bullying and “theory of mind”: A critique of the “social skills deficit” view of antisocial behaviour . Social Development , 8 ( 1 ) : 117 – 127 .
  • Takarangi , M. K. T. , Polaschek , D. L. L. , Hignett , A. and Garry , M. 2008 . Chronic and temporary aggression causes hostile false memories for ambiguous information . Applied Cognitive Psychology , 22 ( 1 ) : 39 – 49 .
  • Ybarra , M. L. and Mitchell , K. J. K. 2004 . Youth engaging in online harassment: Associations with caregiver–child relationships, internet use, and personal characteristics . Journal of Adolescence , 27 ( 3 ) : 319 – 336 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.