1,846
Views
10
CrossRef citations to date
0
Altmetric
Articles

Current trends in cyberbullying

&
Pages 35-57 | Published online: 15 Nov 2013

References

  • The AAUW Educational Foundation Commission on Technology, Gender, and Teacher Education. (2000). Tech-Savvy: Educating girls in the new computer age. Washington, DC: The American Association of University Women Educational Foundation.
  • Aboujaoude E. (2011). Virtually you: The dangerous powers of the E-personality. New York, NY: W. W. Norton & Company, Inc.
  • Aftab P. (2013). The big six – the weapons of choice. Retrieved from: http://www.aftab.com/index.php?page=the-big-six
  • American Psychological Association. (2004). APA resolution on bullying among children and youth. Washington, DC: APA.
  • Anderson C. A., Shibuya A., Ihori N., Swing E. L., Bushman B. J., Sakamoto A., Saleem M. (2010). Violent video game effects on aggression, empathy, and prosocial behavior in Eastern and Western countries: A meta-analytic review. Psychological Bulletin, 136, 151–173.
  • Andreou E. (2001). Bully/victim problems and their association with coping behavior in conflictual peer interactions among school-age children. Educational Psychology, 21, 59–66.
  • Andreou E. (2006). Social preference, perceived popularity and social intelligence: Relations to overt and relational aggression. School Psychology International, 27, 339–351.
  • Ang R. P., Goh D. H. (2010). Cyberbullying among adolescents: The role of affective and cognitive empathy, and gender. Child Psychiatry and Human Development, 41, 387–397.
  • Aricak T., Siyahhan S., Uzunhasanoglu A., Saribeyoglu S., Ciplak S., Yilmaz N., Memmedov C. (2008). Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11(3), 253–261.
  • Bauman S., Newman M. (2013). Testing assumptions about cyberbullying: Perceived distress associated with acts of conventional and cyber bullying. Psychology of Violence, 3(1), 27–38.
  • Bauman S., Summers J. (2009). Victimization and depression in Mexican American middle school students: Including acculturation as a variable of interest. Hispanic Journal for the Behavioral Sciences, 31, 515–535.
  • Baumeister R. F., Leary M. R. (1995). The need to belong: Desire for interpersonal attachments as a fundamental human motivation. Psychological Bulletin, 117(3), 497–529.
  • Beckerman L., Nocero J. (2003). You've got hate mail. Principal Leadership, 3(4), 38–41.
  • Beran T., Li Q. (2007). The relationship between cyberbullying and school bullying. Journal of Student Wellbeing, 1(2), 15–33.
  • Bhat C. S. (2008). Cyberbullying: Overview and strategies for school counselors, guidance officers, and all school personnel. Australian Journal of Guidance and Counseling, 18(1), 53–66.
  • Bruno L. (2004, October 24). Blogging ban provokes debate over cyberspace. Daily Record, pp. 1–6.
  • Burgess-Proctor A., Patchin J. W., Hinduja S. (2010). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. In , Garcia V., Clifford J. (Eds.), Female crime victims: Reality reconsidered (pp. 162–176). Upper Saddle River, NJ: Prentice Hall.
  • Cassidy W., Jackson M., Brown K. N.(2009). Sticks and stones can break my bones, but how can pixels hurt me: Students' experiences with cyber-bullying. School Psychology International, 30(4) , 383–402.
  • Chesney T., Coyne I., Logan B., Madden N. (2009). Griefing in virtual worlds: Causes, casualties and coping strategies. Information Systems Journal, 19, 525–548.
  • Chisholm J. F. (2006). Cyberspace violence against girls and adolescent females. In , Denmark F., Krauss H., Halpern E., Sechzer J. (Eds.), Violence and exploitation against women and girls ( Vol. 1087, pp. 74–89). Boston: Annals of the New York Academy of Sciences.
  • Closson L. M. (2009). Aggressive and prosocial behaviors within early adolescent friendship cliques: What's status got to do with it? Merrill-Palmer Quarterly, 55(4), 406–435.
  • Coie J. D., Dodge K. A., Coppotelli H. (1982). Dimensions and types of social status: A cross-age perspective. Developmental Psychology, 18, 557–569.
  • Cowie H., Colliety P. (2010). Cyberbullying: Sanctions or sensitivity? Pastoral Care in Education, 28(4), 261–268.
  • Crick N. R. (1996). The role of overt aggression, relational aggression, and prosocial behaviour in the prediction of children's future social adjustment. Child Development 67 , 2317–2327.
  • Crick N. R., Casas J. F., Nelson D. A. (2002). Toward a more comprehensive understanding of peer maltreatment: Studies of relationship victimization. Current Directions in Psychological Science, 11(3), 98–101.
  • Dehue F., Bolman C., Vollink T. (2008). Cyberbullying: Youngsters' experiences and parental perception. CyberPsychology and Behavior, 11(2), 217–223.
  • Dellasega C., Nixon C. (2003). Girl wars: 12 strategies that will end female bullying. New York, NY: Simon & Schuster.
  • Erikson E. (1968). Identity, youth and crises. New York: W.W. Norton.
  • Eslea M. (2010). Direct and indirect bullying: Which is more distressing? In , Österman K. (Ed.), Indirect and direct aggression (pp. 69–84). Frankfurt am Main, Germany: Peter Lang.
  • Espelage D. L., Swearer S. M. (2003). Research on school bullying and victimization: What have we learned and where do we go from here? School Psychology Review, 32(3), 365–383.
  • Fekkes M., Pijpers F. I. M., Verloove-Vanhorick S. P. (2005). Bullying: Who does what, when and where? Involvement of children, teachers and parents in bullying behavior. Health Education Research, 20(1), 81–91.
  • Ferguson C. J. (2013). Violent video games and the Supreme Court: Lessons for the scientific community in the wake of Brown v. Entertainment Merchants Association. American Psychologist, 68(2), 57–74.
  • Finn J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483.
  • Garandeau C. F., Ahn H. J., Rodkin P. C. (2011). The social status of aggressive students across contexts: The role of classroom status hierarchy, academic achievement, and grade. Developmental Psychology, 47(6) , 1966.
  • Goldsborough R. (2010). Resources available to fight growing cyberbullying trend. Community College Week. Retrieved from http://www.ccweek.com
  • Harris S., Petrie G., Willoughby W. (2002). Bullying among 9th graders: An exploratory study. NASSP Bulletin, 86(630), 3–14.
  • Herring S. C. (2004). Computer-mediated communication and woman's place. In Robin Tolmach Lakoff [M. Bucholtz (Ed.)], Language and Woman's Place: Text and Commentary (pp. 216–222). NY: Oxford University Press. http://ella.slis.indiana.edu/~herring/lakoff.2004.pdf.
  • Hinduja S. (2012). Smartphone apps and bullying. Retrieved from http://cyberbullying.us/blog/taag/cell-phones
  • Hinduja S., Patchin J. (2007). Offline consequences of online victimization: School violence and delinquency. Journal of School Violence, 6(3), 89–112.
  • Hinduja S., Patchin J. W. (2008). Personal information of adolescents on the internet: A quantitative content analysis of MySpace. Journal of Adolescence, 31(1), 125–146.
  • Hinduja S., Patchin J. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Sage Publications.
  • Hinduja S., Patchin J. W. (2010). Bullying, cyberbullying and suicide. Archives of Suicide Research, 14(3), 206–221.
  • Hinduja S., Patchin J. W. (2013). State Cyberbullying Laws: A brief review of state cyberbullying laws and policies. Retrieved from http://www.cyberbullying.us/Bully_and_Cyberbullying_Laws.pdf
  • Ivers D. (2013). Report: Text messages circulating at Ridgewood elementary school prompt new warning. NJ.com. Retrieved from http://nj.com/bergen/index.ssf/2013/03/text_messagescirculating_at_elementary_school_prompts_new_warning_from_ridgewood_officials_report_s.html
  • Jemal A., Siegel R., Ward E., Murray T., Xu J., Smigal C., Thun M. J. (2006) Cancer statistics. CA: A Cancer Journal for Clinicians, 56(2), 106–130.
  • Jolliffe D., Farrington D. P. (2006). Examining the relationship between low empathy and bullying. Aggressive Behavior, 32, 540–550.
  • Kiesler S., Siegel J., McGuire T. W. (1984). Social psychological aspects of computer mediated communications. American Psychologist, 39, 1123–1134.
  • Kowalski R. M., Limber S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41, S22–S30.
  • Kraft E. M., Wang J. (2010). An exploratory study of the cyberbullying and cyberstalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Technoethics, 1(4), 74–91.
  • LaFontana K. M., Cillessen A. (2002). Children's perceptions of popular and unpopular peers: A multimethod assessment. Developmental Psychology, 38(5), 635–647.
  • Lawler J. P., Molluzzo J. C., Doshi V. (2012). An expanded study of net generation perceptions on privacy and security on social net-working sites (SNS). Information Systems Education Journal, 10(1), 21–36.
  • Lenhart A., Ling R., Campbell S., Purcell K. (2010, April). Teens and mobile phones. PewInternet. Retrieved from http://pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  • Lenhart A., Madden M., Smith A., MacGill A. (2007). Teens and social media. Pew Research Centers Internet and American Life Project, Washington, D.C. Retrieved from http://www.pewinternet.org/Reports/2007/Teens-and-Social-Media.aspx
  • Li Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23(4), 1777–1791.
  • Liau A. K., Khoo A., Ang P. H. (2005). Factors influencing adolescents engagement in risky Internet behavior. CyberPsychology and Behavior, 8(6), 513–520.
  • Maass A., Klopper K. M., Michel F.,, Lohaus A. (2011). Does media use have a short-term impact on cognitive performance? Journal of Media Psychology, 23(2), 65–76.
  • Menesini E., Nocentini A., Calussi P. (2011). The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. CyberPsychology, Behavior and Social Networking, 14(5), 267–274.
  • Merten D. (1997). The meaning of meanness: Popularity, competition and conflict among junior high schools. Sociology of Education, 70(3), 175–191.
  • Mikel-Brown L. (2003). Girlfighting: Betrayal and rejection among girls. New York: New York University Press.
  • Mishna F., Saini M., Solomon S. (2009). Ongoing and online: Children and youth's perceptions of cyber bullying. Children and Youth Services Review, 31, 1222–1228.
  • Mitchell K. J., Becker-Blease K. A., Finkelhor D. (2005). Inventory of problematic Internet experiences encountered in clinical practice. Professional Psychology: Research and Practice, 36(5), 498–309.
  • Mitchell K., Finkelhor D., Wolak J. (2001). Risk Factors for and impact of online sexual solicitation of youth. Journal of the American Medical Association, 285(23), 3011–3014.
  • Muir D. (2005). Violence against children in cyberspace. ECPAT International. Retrieved from http://www.ECPAT_cyberspace_2005_ENG.pdf
  • Nansel T. R., Overpeck M. D., Haynie D. L., Ruan J. W., Scheidt P. C. (2003). Relationships between bullying and violence among U.S. youth. Archives of Pediatrics & Adolescent Medicine, 157(4), 348–353.
  • Nansel T. R., Overpeck M., Pilla R. S., Ruan J. W., Simons-Morton B., Scheidt P. (2001). Bullying behaviors among U.S. Youth: Prevalence and association with psychosocial Adjustment. Journal of the American Medical Association, 16, 2094–2100.
  • Olweus D. (1993). Bullying at school: What we know and what we can do. Cambridge, MA: Blackwell.
  • Ong W. (2002). Orality and literacy (2nd ed.). London: Routledge.
  • Oppel R. A. (2013). Ohio teenagers guilty in rape that social media brought to light. The New York Times. Retrieved from http://www.nytimes.com/2013/03/18/us/teenagers-found-guilty-in-rape-in-steubenville-ohio.html?pagewanted=all
  • Palfrey J., Gasser U. (2008). Born digital: Understanding the first generation of digital natives. New York: Basic Books.
  • Palfrey J., Sacco D., Boyd D., DeBonis L. (2009). Enhancing child safety & online technologies. Final report of the internet safety technical task force to the multi-state working group on social networking of State Attorneys General of the United States, Berkman Center for Internet & Society at Harvard University.
  • Patchin J., Burgess-Proctor A., Hinduja S. (2009). Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. In , Garcia V., Clifford J. (Eds.), Female victims of crime: Reality reconsidered (pp. 162–176). Upper Saddle River, NJ: Prentice Hall.
  • Patchin J., Hinduja S. (2006). Bullies move beyond the Schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148–169.
  • Patchin J., Hinduja S. (2010). Cyberbullying and self-esteem. Journal of School Health, 80(12), 614–621.
  • Pellegrini A., Long J. (2002). A longitudinal study of bullying, dominance, and victimization during the transition from primary school through secondary school. British Journal of Developmental Psychology, 20(2), 259–288.
  • Pew Research Center. (2010) Millennials: A portrait of generation next: confident. Connected. Open to change. Retrieved from Pew Research Center website: http://www.pewresearch.org/millennials
  • Privetera C., Campbell M. A. (2009). Cyberbullying: The new face of workplace bullying? Cyber Psychology & Behavior, 12(4), 395–400.
  • Reese D. (2013). Steubenville, Ohio rape victim threatened by ‘mean girls’. The Washington Post. Retrieved from http://www.washingtonpost.com/blogs/she-the-people/wp/2013/03/20/steubenville-ohio-rape-threatened-by-mean-girls/
  • Remillar A. M., Lamb S. (2005). Adolescent girls' coping with relational aggression. Sex Roles, 53(3/4), 221–229.
  • Ringrose J., Gill R., Livingstone S., Harvey L. (2012). A qualitiative study of children, young people and ‘Sexting’. National Society for the Prevention of Cruelty to Children (NSPCC), London, UK.
  • Ruderman W. (2013). Fire Commissioner's son resigns as offensive Twitter posts surface. The New York Times. Retrieved from http://www.nytimes.com/2013/03/19/nyregion/son-of-salvatore-cassano-resigns-in-wake-of-twitter-posts.html
  • Salmivalli C., Kärnä A., Poskiparta E. (2011). Counteracting bullying in Finland: The KiVa program and its effects on different forms of being bullied. International Journal of Behavioral Development, 35, 405–411.
  • Salmivalli C., Nieminen E. (2002). Proactive and reactive aggression among school bullies, victims, and bully-victims. Aggressive Behavior, 28, 30–44.
  • Salmivalli C., Peets K. (2008). Bullies, victims, and bully–victim relationships. In , Rubin K., Bukowski W., Laursen B. (Eds.), Handbook of peer interactions, relationships, and groups (pp. 322–340). New York, NY: Guilford Press.
  • Simmons R. (2002). Odd girl out: The hidden culture of aggression in girls. New York: Harcourt Brace.
  • Slonje R., Smith P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49, 147–154.
  • Smith P. K., Mahdavi J., Carvalho M., Fisher S., Russell S., Tippett N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49, 376–385.
  • Smith A., Williams K. (2004). R U there? Ostracism by cell phone text messages. Group Dynamics: Theory, Research and Practice, 8(4), 291–301.
  • Snider M.,, Borel K. (2004, May 24). Stalked by a cyberbully, Macleans. Retrieved from http://www.macleans.ca/article.jsp?content=20040524_81183_81183
  • STAR-W (Students Using Technology to Achieve Reading and Writing). (2005). Bullies to buddies: 4 types of cyberbullies. Retrieved from http://www.starw.org/b2b/4TypesofCyberbullies.htm
  • Suler J. (2005). The psychology of cyberspace. Retrieved from http://www.rider.edu/suler/psycyber.html
  • Torres K. (2012). Bullied 9 year old Alamosa student fights back. Retrieved from http://www.9news.com/news/article/300510/129/bullied-9-year-old-Alamosa-student-fights-back
  • Underwood M. (2003). Social aggression among girls. Guilford Press: New York.
  • Underwood M., Rosen L. H., More D., Ehrenreich S. E., Gentsch J. K. (2012). The BlackBerry project: Capturing the content of adolescents' test messaging. Developmental Psychology, 48(2), 295–302.
  • United States department of Education, Office of Planning, Evaluation and Policy Development, Policy and Program Studies. (2011). Analysis of state bullying laws and policies, Washington, D.C. Retrieved from http://www.ed.gov/about/offices/list/opepd/ppss/index.html
  • Valkenburg P. M., Peter J. (2007). Preadolescents' and adolescents' online communication and their closeness to friends. Developmental Psychology, 43(2), 267–277.
  • Vandebosch H., Van Cleemput K. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology and Behavior, 11, 499–503.
  • van der Wal M. F., de Wit C. A. M., Hirasing R. A. (2003). Psychosocial health among young victims and offenders of direct and indirect bullying. Pediatrics, 111, 1312–1317.
  • Veenstra R., Lindenberg S., Oldehinkel A., DeWinter A., Verhulst F. C. (2005). Bullying and victimization in elementary schools: A comparison of bullies, victims, bully/victims and uninvolved preadolescents. Developmental Psychology, 41(4), 672–682.
  • Wallace P. (1999). The psychology of the internet. Cambridge: Cambridge University Press.
  • Walrave M., Heirman W. (2011). Cyberbullying: Predicting victimization and perpetration. Children and Society, 25, 59–72.
  • Wang J., Ianotti R., Nansel T. R. (2009). School bullying among US adolescents: Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45, 368–375.
  • Willard N. (2003). Off-campus, harmful online student speech. Journal of School Violence, 1(2), 65–93.
  • Williams K. A. (2001). Ostracism: The power of silence. New York: Guilford Press.
  • Williams K., Guerra N. G. (2007). Prevalence and predictors of Internet bullying. Journal of Adolescent Health, 41, S14–S21.
  • Wolak J., Finkelhor D., Mitchell K., Ybarra M. (2010). Online predators and their Victims: Myths, realities and implications for prevention and treatment. Psychology of Violence, 1(S), 13–35.
  • Wright V. H., Burnham J. J., Inman C. T., Ogorchock H. N. (2009). Cyberbullying: Using virtual scenarios to educate and raise awareness. Journal of Computing in Teacher Education, 26(1), 35–42.
  • Ybarra M., Mitchell K. (2004). Online Aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry, 45(7), 1308–1316.
  • Zelazo P. D., Muller U., Frye D.,, Marcovitch S. (2003). The development of executive function in early childhood: I. The development of executive function. Monographs of the Society for Research in Child Development, 68(3), 11–27.
  • Zizek S. (2004). What can psychoanalysis tell us about cyberspace? Psychoanalytic Review, 91(6), 801–830.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.