Back to Search Start Over

Determinants of Self-Reported Bystander Behavior in Cyberbullying Incidents Amongst Adolescents.

Authors :
DeSmet, Ann
Veldeman, Charlene
Poels, Karolien
Bastiaensens, Sara
Van Cleemput, Katrien
Vandebosch, Heidi
De Bourdeaudhuij, Ilse
Source :
CyberPsychology, Behavior & Social Networking. Apr2014, Vol. 17 Issue 4, p207-215. 9p.
Publication Year :
2014

Abstract

This study explores behavioral determinants of self-reported cyberbullying bystander behavior from a behavioral change theoretical perspective, to provide levers for interventions. Nine focus groups were conducted with 61 young adolescents (aged 12-16 years, 52% girls). Assertive defending, reporting to others, providing advice, and seeking support were the most mentioned behaviors. Self-reported bystander behavior heavily depended on contextual factors, and should not be considered a fixed participant role. Bystanders preferred to handle cyberbullying offline and in person, and comforting the victim was considered more feasible than facing the bully. Most prevailing behavioral determinants to defend or support the victim were low moral disengagement, that the victim is an ingroup member, and that the bystander is popular. Youngsters felt they received little encouragement from their environment to perform positive bystanding behavior, since peers have a high acceptance for not defending and perceived parental support for defending behavior is largely lacking. These results suggest multilevel models for cyberbullying research, and interventions are needed. With much previous research into cyberbullying insufficiently founded in theoretical models, the employed framework of the Integrative Model and Social Cognitive Theory may inspire future studies into bystander behavior. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
21522715
Volume :
17
Issue :
4
Database :
Academic Search Index
Journal :
CyberPsychology, Behavior & Social Networking
Publication Type :
Academic Journal
Accession number :
95394070
Full Text :
https://doi.org/10.1089/cyber.2013.0027