3,237
Views
27
CrossRef citations to date
0
Altmetric
Articles

“People think it’s a harmless joke”: young people’s understanding of the impact of technology, digital vulnerability and cyberbullying in the United Kingdom*

&
Pages 20-35 | Received 11 Dec 2015, Accepted 02 Sep 2016, Published online: 24 Sep 2016

References

  • Anderson, T., & Sturm, B. (2007). Cyberbullying: From playground to computer. Youth Adult Library Services, 5(2), 24–27.
  • Ando, R., & Sakamoto, A. (2008). The effect of cyber-friends on loneliness and social anxiety: Differences between high and low self-evaluated physical attractiveness groups. Computers in Human Behavior, 24, 993–1009. doi:10.1016/j.chb.2007.03.003
  • Beale, A. V., & Hall, K. R. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, 81, 8–12.10.3200/TCHS.81.1.8-12
  • Braun, C., & Clarke, V. (2013). Successful qualitative research: A practical guide for beginners. Thousand Oaks, CA: Sage.
  • Cassidy, W., Faucher, C., & Jackson, M. (2013). Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34, 575–612. doi:10.1177/0143034313479697
  • Cassidy, W., Jackson, M., & Brown, K. (2009). Sticks and stones can break my bones, but how can pixels hurt Me?: Students’ experiences with cyber-bullying. School Psychology International, 30, 383–402. doi:10.1177/014303430910694
  • Chayko, M. (2014). Techno-social life: The internet, digital technology, and social connectedness. Sociology Compass, 8, 976–991. doi:10.1111/soc4.12190
  • Cho, H., Lee, J., & Chung, S. (2010). Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behavior, 26, 987–995. doi:10.1016/j.chb.2010.02.012
  • Clarke, C. (2009). An introduction to interpretative phenomenological analysis: A useful approach for occupational therapy research. The British Journal of Occupational Therapy, 72, 37–39. doi:10.1177/030802260907200107
  • Davies, K., Randall, D. P., Ambrose, A., & Orand, M. (2014). ‘I was bullied too’: Stories of bullying and coping in an online community. Information, Communication & Society, 18, 357–375. doi:10.1080/1369118X.2014.952657
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 319–340. doi:10.2307/249008
  • Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 982–1003. doi:10.1287/mnsc.35.8.982
  • Dempsey, A. G., Sulkowski, M. L., Nichols, R., & Storch, E. A. (2009). Differences between peer victimization in cyber and physical settings and associated psychosocial adjustment in early adolescence. Psychology in the Schools, 46, 962–972. doi:10.1002/pits.20437
  • Dynel, M. (2008). No aggression, only teasing: The pragmatics of teasing and banter. Lodz Papers in Pragmatics, 4, 241–261. doi:10.2478/v10016-008-0001-7
  • Eliot, M., Cornell, D., Gregory, A., & Fan, X. (2010). Supportive school climate and student willingness to seek help for bullying and threats of violence. Journal of School Psychology, 48, 533–553. doi:10.1016/j.jsp.2010.07.001
  • Erdur-Baker, O. (2010). Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools. New Media & Society, 12, 109–125. doi:10.1177/1461444809341260
  • Erickson, J., & Johnson, G. M. (2011). Internet use and psychological wellness during late adulthood. Canadian Journal on Aging/La Revue canadienne du vieillissement, 30, 197–209. doi:10.1017/S0714980811000109
  • Espelage, D. L., & Swearer, S. M. (2003). Research on school bullying and victimization: What have we learned and where do we go from here? School Psychology Review, 32, 365–383.
  • Finkelhor, D. (2014). Commentary: Cause for alarm? Youth and internet risk research – A commentary on Livingstone and Smith (2014). Journal of Child Psychology and Psychiatry, 55, 655–658. doi:10.1111/jcpp.12260
  • Gibson, J. E. (2012). Interviews and focus groups with children: Methods that match children's developing competencies. Journal of Family Theory & Review, 4, 148–159. doi:10.1111/j.1756-2589.2012.00119.x
  • Giedd, J. N. (2012). The digital revolution and adolescent brain evolution. Journal of Adolescent Health, 51, 101–105. doi:10.1016/j.jadohealth.2012.06.002
  • Holt, M., & Keyes, M. (2004). Teachers’ attitudes toward bullying. In D. Espelage & S. Swearer (Eds.), Bullying in American schools: A social-ecological perspective on prevention and intervention (pp. 121–139). Mahwah, NJ: Erlbaum.
  • Hoppe, M. J., Wells, E. A., Morrison, D. M., Gillmore, M. R., & Wilsdon, A. (1995). Using focus groups to discuss sensitive topics with children. Evaluation Review, 19, 102–114. doi:10.1177/0193841X9501900105
  • Igbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega, 23, 587–605.10.1016/0305-0483(95)00035-6
  • Jackson, C. L., & Cohen, R. (2012). Childhood victimization: Modeling the relation between classroom victimization, cyber victimization, and psychosocial functioning. Psychology of Popular Media, 1, 254–269. doi:10.1037/a0029482
  • Jackson, M., Cassidy, W., & Brown, K. (2009). Out of the mouth of babes: Students’ voice their opinions on cyber-bullying. Long Island Education Review, 8, 24–30.
  • Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140, 1073–1137. doi:10.1037/a0035618
  • Kwan, G. C. E., & Skoric, M. M. (2013). Facebook bullying: An extension of battles in school. Computers in Human Behavior, 29, 16–25. doi:10.1016/j.chb.2012.07.014
  • Livingstone, S., & Smith, P. K. (2014). Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry, 55, 635–654. doi:10.1111/jcpp.12197
  • Manago, A. M., Taylor, T., & Greenfield, P. M. (2012). Me and my 400 friends: The anatomy of college students’ Facebook networks, their communication patterns, and well-being. Developmental Psychology, 48, 369–380. doi:10.1037/a0026338
  • Mark, L., & Ratliffe, K. T. (2011). Cyber worlds: New playgrounds for bullying. Computers in the Schools, 28, 92–116. doi:10.1080/07380569.2011.575753
  • Mishna, F., McLuckie, A., & Saini, M. (2009). Real-world dangers in an online reality: A qualitative study examining online relationships and cyber abuse. Social Work Research, 33, 107–118. doi:10.1093/swr/33.2.107
  • O’Keeffe, G. W., Clarke-Pearson, K., & Council on Communication and Media. (2011). The impact of social media on children, adolescents, and families. Pediatrics, 127, 800–804. doi:10.1542/peds.2011-0054
  • Odacı, H., & Kalkan, M. (2010). Problematic internet use, loneliness and dating anxiety among young adult university students. Computers & Education, 55, 1091–1097. doi:10.1016/j.compedu.2010.05.006
  • Ofcom. (2015). The communications market report. Retrieved from http://stakeholders.ofcom.org.uk/binaries/research/cmr/cmr15/CMR_UK_2015.pdf
  • Paradise, A., & Sullivan, M. (2012). (In)visible threats? The Third-person effect in perceptions of the influence of facebook. Cyberpsychology, Behavior, and Social Networking, 15, 55–60. doi:10.1089/cyber.2011.0054
  • Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 148–169. doi:10.1177/1541204006286288
  • Pendergrass, W., & Wright, M. (2014). Cyberbullied to death: An analysis of victims from recent events. Issues in Information Systems, 15, 132–140.
  • Perloff, R. M. (1993). Third-person effect research 1983–1992: A review and synthesis. International Journal of Public Opinion Research, 5, 167–184. doi:10.1093/ijpor/5.2.167
  • Peterson-Sweeney, K. (2005). The use of focus groups in pediatric and adolescent research. Journal of Pediatric Health Care, 19, 104–110. doi:10.1016/j.pedhc.2004.08.006
  • Przybylski, A. K., Murayama, K., DeHaan, C. R., & Gladwell, V. (2013). Motivational, emotional, and behavioural correlates of fear of missing out. Computers in Human Behavior, 29, 1814–1848. doi:10.1016/j.chb.2013.02.014
  • Quelhas Brito, P. (2012). Tweens’ characterization of digital technologies. Computers & Education, 59, 580–593. doi:10.1016/j.compedu.2012.03.005
  • Rivera, M. T., Soderstrom, S. B., & Uzzi, B. (2010). Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms. Annual Review of Sociology, 36, 91–115. doi:10.1146/annurev.soc.34.040507.134743
  • Salwen, M. B., & Dupagne, M. (2001). Third_person perception of television violence: The role of self_perceived knowledge. Media Psychology, 3, 211–236. doi:10.1207/S1532785XMEP0303_01
  • Scharrer, E., & Leone, R. (2008). First-person shooters and the third-person effect. Human Communication Research, 34, 210–233. doi:10.1111/j.1468-2958.2008.00319.x
  • Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154. doi:10.1111/j.1467-9450.2007.00611.x
  • Smith, P. K. (2004). Bullying: Recent developments. Child and Adolescent Mental Health, 9, 98–103. doi:10.1111/j.1475-3588.2004.00089.x
  • Smith, J. A., & Eatough, V. (2007). Interpretative phenomenological analysis. In G. M. Breakwell, S. Hammond, C. Fife-Schaw, & J. A. Smith (Eds.), Research methods in psychology (pp. 322–341). London: Sage Publication.
  • Smith, J. A., & Osborn, M. (2008). Interpretative phenomenological analysis. In J. A. Smith (Ed.), Qualitative psychology: A practical guide to research methods (pp. 53–80). London: Sage.
  • Spears, B., Slee, P., Owens, L., & Johnson, B. (2009). Behind the scenes and screens: Insights into the human dimension of covert and cyberbullying. Journal of Psychology, 217, 189–196. doi:10.1027/0044-3409.217.4.18
  • Thelwell, R. C., Page, J. L., Lush, A., Greenlees, I. A., & Manley, A. J. (2013). Can reputation biases influence the outcome and process of making competence judgments of a coach? Scandinavian Journal of Medicine & Science in Sports, 23, e65–e73. doi:10.1111/sms.12000
  • Thorpe, K., Hansen, J., Danby, S., Zaki, F. M., Grant, S., Houen, S., … Given, L. M. (2015). Digital access to knowledge in the preschool classroom: Reports from Australia. Early Childhood Research Quarterly, 32, 174–182. doi:10.1016/j.ecresq.2015.04.001
  • Utz, S., Tanis, M., & Vermeulen, I. (2012). It is all about being popular: The effects of need for popularity on social network site Use. Cyberpsychology, Behavior, and Social Networking, 15, 37–42. doi:10.1089/cyber.2010.0651
  • Vandebosch, H., & Van Cleemput, K. (2009). Cyberbullying among youngsters: Profiles of bullies and victims. New Media Society, 11, 1349–1371. doi:10.1177/1461444809341263
  • Wang, J., Iannotti, R., & Luk, J. (2012). Patterns of adolescent bullying behaviors: Physical, verbal, exclusion, rumor, and cyber. Journal of School Psychology, 50, 521–534. doi:10.1016/j.jsp.2012.03.004
  • Willard, N. (2007). The authority and responsibility of school officials in responding to cyberbullying. Journal of Adolescent Health, 41, S64–S65. doi:10.1016/j.jadohealth.2007.08.013
  • Wong-Lo, M., & Bullock, L. M. (2011). Digital aggression: Cyberworld meets school bullies. Preventing School Failure: Alternative Education for Children and Youth, 55, 64–70. doi:10.1080/1045988X.2011.539429
  • Zhao, X., & Cai, X. (2008). From self-enhancement to supporting censorship: The third-person effect process in the case of internet pornography. Mass Communication & Society, 11, 437–462. doi:10.1080/15205430802071258

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.