Cyberbullying in Adolescents: Modalities and Aggressors' Profile
Cyberbullying in Adolescents: Modalities and Aggressors' Profile
Cyberbullying in Adolescents: Modalities and Aggressors' Profile
net/publication/220495959
CITATIONS READS
275 3,363
5 authors, including:
Some of the authors of this publication are also working on these related projects:
PROEM: Interdisciplinary networks for the promotion of emotional health and well-being in the young View project
All content following this page was uploaded by Ana Estévez on 29 April 2016.
a r t i c l e i n f o a b s t r a c t
Article history: In this study, a questionnaire (Cyberbullying Questionnaire, CBQ) was developed to assess the prevalence
Available online 8 April 2010 of numerous modalities of cyberbullying (CB) in adolescents. The association of CB with the use of other
forms of violence, exposure to violence, acceptance and rejection by peers was also examined. In the
Keywords: study, participants were 1431 adolescents, aged between 12 and17 years (726 girls and 682 boys). The
Cyberbullying adolescents responded to the CBQ, measures of reactive and proactive aggression, exposure to violence,
Adolescents justification of the use of violence, and perceived social support of peers. Sociometric measures were also
Proactive and reactive aggression
used to assess the use of direct and relational aggression and the degree of acceptance and rejection by
Exposure to violence
Social support
peers. The results revealed excellent psychometric properties for the CBQ. Of the adolescents, 44.1%
responded affirmatively to at least one act of CB. Boys used CB to greater extent than girls. Lastly, CB
was significantly associated with the use of proactive aggression, justification of violence, exposure to
violence, and less perceived social support of friends.
Ó 2010 Elsevier Ltd. All rights reserved.
0747-5632/$ - see front matter Ó 2010 Elsevier Ltd. All rights reserved.
doi:10.1016/j.chb.2010.03.017
Table 1
Representative studies of cyberbullying.
(Solberg & Olweus, 2003). The questionnaire includes a (1) 92 pupils, supplemented by focus groups; once a week, or several times
definition of bullying followed by a statement about (2) 533 pupils a week) and 15.6% once or twice
cyberbullying as including the seven media: through text No gender differences
E. Calvete et al. / Computers in Human Behavior 26 (2010) 1128–1135
(2006), in a sample of 264 high school students, found that 22% of affect their future behavior. Cognitive-social theories have gener-
the boys and 12% of the girls admitted having cyberbullied others. ally called such knowledge structures schemas or scripts (Hues-
In a cross-cultural study, the same authoress found percentages of mann, 1988). In the case of aggressive behavior, many studies
cyberbullies ranging between 15% and 7%, respectively, for Canada have revealed the presence of schemas related to the justification
and China (Li, 2008). In a study carried out with Turkish students, of the use of violence. For example, various studies have detected
35.7% admitted performing CB (Aricak et al., 2008). In Spain, Orte- that children and adolescents who believe that it is appropriate
ga, Calmaestra, and Mora-Merchán (2008) found in adolescents to attack others when they deserve it are more apt to be aggressive
that 5.7% admitted having performed CB occasionally, and 1.7% (Bentley & Li, 1995; Bosworth, Espelage, & Simon, 1999; Calvete,
had carried out severe forms of CB. Although most of the research 2008; Calvete & Cardeñoso, 2005; Huesmann & Guerra, 1997). In
was carried out in schools, in some cases it was online (Hinduja & fact, a recent study of Williams and Guerra (2007) found an asso-
Patchin, 2008). ciation between justification of violence and CB. However, in their
A limitation of many of the studies is that they assessed the study, the measurement of CB was a single question that referred
occurrence of CB generically, without specifying in detail the to spreading lies about classmates by e-mail or instant messaging,
modalities employed. For example, in some cases, they focused and other forms of CB were not included.
on providing a definition of CB and asking the participants whether In addition, a series of contextual variables have been linked to
they had carried out CB, and if so, to describe aspects such as the violent behavior for a long time. Firstly, the role of exposure to vio-
means employed (chat room, e-mail, cell phone). This perspective lence was pointed out from the social learning model by Bandura
is valuable to address a new phenomenon about which relatively (1986). Children who observe more positive consequences and
few studies have been carried out. However, as we discover more fewer negative ones for aggression acquire the belief that aggres-
about the importance of the phenomenon, it becomes appropriate sive behavior leads to good consequences. In general, diverse stud-
to develop more specific measures that include a broad array of CB ies support the fact that aggressive behavior increases with
modalities. Therefore, the first goal of this study consisted of devel- exposure to violence at home, at school, in the neighborhood,
oping a questionnaire to assess the performance of many types of and in the mass media (Baldry, 2003; Coyne & Archer, 2005; Flan-
CB by adolescents. nery, Wester, & Singer, 2004; Gorman-Smith, Henry, & Tolan, 2004;
On the other hand, CB reveals a series of differences with the Harold & Conger, 1997; Huesmann, Moise-Tisus, Posolski, & Eron,
traditional types of maltreatment and bullying among school- 2003; Schwartz & Proctor, 2000).
mates. Elements such as the perception of online anonymity and Lastly, among the contextual variables are experiences with
the safety of hiding behind a computer screen contribute to freeing peers, and rejection by peers is one of the most important factors
individuals from traditional constraints and social pressures, as (Laird, Jordan, Dodge, Pettit, & Bates, 2001). Numerous investiga-
well as from moral and ethical misgivings (Hinduja & Patchin, tions have found a clear relation between aggressive behavior
2008; Li, 2007a, 2007b). Thus, adolescents who would not behave and rejection (see Dodge, Coie, & Lynam, 2006). However, the re-
violently in a face-to-face situation can adopt different roles and sults have been mixed, depending on the type of aggressive behav-
perform this type of violence. Anonymity also implies the absence ior (Card & Little, 2006; Price & Dodge, 1989; Salmivalli,
of consequences, because the aggressors frequently cannot be Kaukiainen, & Lagerspetz, 2000), and, in general, suggest that rejec-
identified and, therefore, they avoid punishment. These character- tion is positively associated with reactive aggression and nega-
istics make one wonder whether the psychological profile of the tively with indirect aggression.
adolescents who carry out CB is similar to or different from the Summing up, the goals of this study were (1) to develop a ques-
profile associated with traditional forms of violence. Therefore, tionnaire to assess a variety of CB behaviors. This goal in turn im-
the second goal of the study consisted of assessing the relation be- plied the assessment of the measurement model of the instrument.
tween CB, offline forms of violence, and associated risk factors. (2) To study the relation of CB with other indicators of aggressive
Regarding the relation of CB to other violent behaviors in ado- behavior such as the justification of violence and the frequency
lescents, CB should be associated with forms of proactive aggres- of proactive, reactive, direct, and indirect aggressive behaviors.
sion and indirect aggression. Proactive aggression consists of And (3) to study the association between CB and diverse contextual
deliberate and planned behavior with the intention of obtaining variables such as exposure to violence and acceptance and rejec-
a reward and is differentiated from reactive aggression, which re- tion by peers.
fers to a furious response to a perceived threat or provocation
(Dodge, 1991). In fact, previous studies suggest that traditional
bullying is more closely associated with proactive than with reac- 2. Method
tive aggressiveness (Roland & Idsøe, 2001; Schwartz et al., 1998;
Unnever, 2005). On the other hand, indirect aggression, also called 2.1. Participants
relational or social aggression, consists of harming someone by
means of manipulating relationships (Björkqvist, 2001; Björkqvist, The sample was made up of 1431 adolescents, between 12 and
Lagerspetz, & Kaukiainen, 1992; Crick & Grotpeter, 1995). In this 17 years, high school students from 31 classrooms of 10 educa-
type of aggression, covert strategies are used in order to exclude tional centers of Bizkaia (Spain). The measurements were taken be-
and isolate rivals in the peer group. These actions include spread- tween March and May of 2008. Of the sample, 726 were girls, 682
ing rumors about others, threatening to end personal relationships, boys, and 23 did not indicate gender. The mean age was
and to reveal private information (Crick, 1995; Galen & Under- 14.09 years (SD = 1.33). The degree of representativeness of the
wood, 1997). In this sense, certain forms of CB have the same char- sample was 3.82% and the sampling error 2.6%. A cluster-sampling
acteristics as traditional indirect bullying (Dehue, Bolman, & method was used, and high schools were selected randomly. Of the
Völlink, 2008) and CB has even been defined as a computer-medi- adolescents, 94.8% were White and 5.2% of other ethnic minorities.
ated form of indirect aggression (Piazza & Bering, 2009). Regarding academic course, 353 were first-graders of secondary
One of the risk factors that have been traditionally associated education, 353 were in second grade, 369 in third grade, and 300
with the above-mentioned forms of aggressive behavior, and with were in fourth grade. To determine the parents’ socioeconomic le-
bullying in particular, are normative beliefs about the justification vel, we followed the recommendations of the Work Group of the
of violence. Adolescents’ experiences throughout their lives lead Spanish Society of Epidemiology and the Spanish Society of Family
them to store in their memories certain knowledge structures that and Community Medicine (2000), which are based on the last job
Author's personal copy
held by the parents. According to this criterion, the distribution 2.2.3. The Exposure to Violence Scale (Orue & Calvete, 2008)
was as follows: 14.4% low, 20.7% low-medium, 30.3% medium, The Exposure to Violence Scale has 21 items about the exposure
21.2% high-medium, and 13.3% high. to violence (physical, verbal, and threats) in four contexts: at
school, in the neighborhood, at home, and on television. The items
include direct exposure, which refers to victimization and indirect
2.2. Measures
exposure, which refers to situations in which the adolescent wit-
nesses violence. Each item is responded on a 5-point Likert-type
2.2.1. The Cyberbullying Questionnaire (CBQ)
scale ranging from 0 (never) to 4 (every day). The Cronbach alpha
This questionnaire was developed in this study. The CBQ con-
coefficient was .88.
sists of 16 items that describe 16 forms of CB, such as sending
threatening or intimidating messages to someone, impersonating
someone (hacking), recording aggressions by cell phone, excluding 2.2.4. Peer rejection and acceptance
an online companion, etc., which were identified in previous stud- Following the procedure of most of the previous studies (Dodge
ies (Smith et al., 2006; Willard, 2006, 2007). Some of the items im- et al., 2003; Miller-Johnson, Coie, Maumary-Gremaud, Bierman
ply very active participation (e.g., hanging intimidating material and Conduct Problems Prevention Research Group, 2002; Prinstein
about a classmate on the Internet), whereas others assume collab- & La Greca, 2004), a peer nomination instrument was used to as-
oration with the previous action (e.g., resending the link to other sess acceptance and rejection by peers. The adolescents indicated
people for them to see). The adolescent had to respond on a scale the names of the classmates they ‘‘liked the most” and those they
of 0 (never) 1 (sometimes), and 2 (often). In addition, various items ‘‘liked the least.” The nominations were standardized within each
include open questions to describe the behavior carried out (e.g., class to obtain the scores of rejection and acceptance for each stu-
Item 3: In the case of hanging humiliating images of a classmate on dent. Previous studies indicate that peer nominations and the
the Internet, describe what kind of images). The Appendix includes scores thereby obtained are a valid indication of acceptance and
the complete questionnaire. rejection, with good indexes of test–retest validity (Coie & Dodge,
1983). In addition to the sociometric approach, we also assessed
perceived social support by means of the Multidimensional Scale
2.2.2. The Irrational Beliefs Scale for Adolescents (IBSA; Cardeñoso & of Perceived Social Support (MSPSS; Zimet, Dahlem, Zimet, & Farley,
Calvete, 2004) 1988). This scale assesses support perceived to be available from
The Justification of Violence subscale of the IBSA consists of nine family, friends, and significant others. Each item is rated using a
items that reflect the idea that aggression is appropriate in a vari- scale from 1 (Very Strongly Disagree) to 7 (Very Strongly Agree). This
ety of situations (e.g., ‘‘Sometimes you have to hit others because scale has shown good reliability and validity, with Cronbach’s al-
they deserve it”), and that aggression enhances self-esteem and pha ranging from .84 to .92 in various American samples (Zimet,
helps to maintain status among peers (e.g., ‘‘Being good at fighting Powell, Farley, Werkman, & Berkoff, 1990), and a Cronbach’s alpha
is something to be proud of” and ‘‘It is better to have a row than let of .89 in a Spanish sample (Landeta & Calvete, 2002). In this study,
them think I am a coward”). Each item is rated on a 4-point Likert- we only used the subscale of Friends’ Support which had a Cron-
type scale ranging from 1 (not at all true) to 4 (completely true). Pre- bach alpha coefficient of .81.
vious research has shown that this subscale is associated with
aggressive and delinquent behavior (Calvete & Cardeñoso, 2005).
2.3. Procedure
In this study, the alpha coefficient was .84.
Multiple measures were employed to assess aggressive behav-
The headmasters of several schools were contacted and asked
ior. The Reactive–Proactive Aggression Questionnaire (Raine et al.,
for their schools to participate in the study. After granting permis-
2006) consists of 11 items for reactive aggression (‘‘How often have
sion, they decided to collect passive consent from the students’
you become angry or mad when you don’t get your way?”) and 12
parents. Thus, parents were informed and given the option of
items for proactive aggression (‘‘How often have you had fights
refusing to allow their son/daughter’s participation. The adoles-
with others to show who was on top?”). Each item is rated as 0
cents filled in the questionnaires in their classrooms. Participants
(never), 1 (sometimes) or 2 (often). The questionnaire has shown
were informed that their responses were confidential and were
good reliability and validity in adolescent samples. Alpha coeffi-
encouraged to ask questions if they had any trouble answering
cients in this study were .81 and .85 for reactive and proactive
the items. Participation was voluntary, and a few adolescents
aggression, respectively. In addition, a peer nomination instru-
(n = 6) decided not to participate in the study. The questionnaires
ment, similar to that used in other studies (Crick & Grotpeter,
took around 50 min to complete.
1995), was employed to assess direct and indirect aggressiveness.
The instrument has 8 items, 4 for direct aggressiveness (e.g., class-
mates who hit or shove others) and 4 for relational/indirect aggres- 3. Results
siveness (e.g., a classmate who tells his or her friends that they will
no longer be friends unless they do what he or she wants). Previous 3.1. Factor analysis of the Cyberbullying Questionnaire
studies have found satisfactory internal consistency of the scales
(e.g., Crick, 1995; Crick & Grotpeter, 1995) and good test–retest The Kaise–Meyer–Olkin index was .96, indicating that the cor-
validity, r = .82 for indirect aggressiveness and .90 for direct relation matrix was suitable for factor analysis. The parameters
aggressiveness over a 4-week interval (Crick, 1996). Following for confirmatory factor analysis were estimated using the polych-
the procedure employed in previous studies (Crick, 1995; Crick & oric and the asymptotic covariance matrixes of the CBQ items.
Grotpeter, 1995), the adolescents were requested to name three We tested a one-factor model via Weight Least Squared estimation
classmates of either sex who had behaved as described. The num- with LISREL 8.8 (Jöreskog & Sörbom, 2006). Following the recom-
ber of nominations that the adolescents received from their class- mendations from a number of authors (e.g., Hu & Bentler, 1999),
mates for each item was added and standardized in each class. goodness of fit was assessed by the comparative fit index (CFI),
Then, the standardized scores of each item for each subscale were the nonnormed fit index (NNFI), and the root mean square error
added to obtain the total score of direct and indirect aggressive- of approximation (RMSEA). Generally, CFI and NNFI values of .95
ness. The Cronbach alpha coefficients in this study were .90 for di- or above and RMSEA values less than .06 reflect good fit. In all
rect aggressiveness and .77 for indirect aggressiveness. the models, we used the effects-coding method proposed by Little,
Author's personal copy
Slegers, and Card (2006) to identify and set the scale of the latent graphs, adding, for example, a moustache”, or ‘‘silly dancing”.
variables. This method consists of constraining the set of indicator Examples of Items 8 and 9 were ‘‘cutting off the leg of a chair so
intercepts to sum to zero for each construct and the set of loadings they will fall down when they sit and then recording them” and
for a given construct to average 1.0, which is the same as having ‘‘making someone sing something silly and sending the video”.
them sum to the number of unique indicators. According to Little Most of the contents of Items 10 and 11 refer to kicking classmates,
et al., this method is suitable to confirm the factor structure of a or, in some cases, a vagabond. Lastly, in some cases, the adoles-
construct from particular items. The fit indexes were excellent cents indicated that they recorded aggressive scenes but as a joke,
for the model, v2(104, n = 1431) = 140, RMSEA = .016 (0.0079; like a stage scene. In these cases, it was not considered CB and
0.022), NNFI = 1, CFI = 1. All the factor loadings ranged between these responses were not included in the prevalence rate or in
.90 and .99. Alpha coefficient was .96 and the mean correlation be- the other statistical analyses.
tween items was .64, revealing that, in general, the use of the di-
verse CB modalities was highly consistent. 3.3. Variables associated with CB behavior
Gender differences were found in the use of CB. With regard to the
3.2. Frequency of CB behaviors
prevalence rate, 40.3% of the girls and 47.8% of the boys responded
affirmatively to at least one of the CBQ items, and the difference
Of the sample, 44.1% of the adolescents responded affirmatively
was statistically significant, v2(1, n = 1403) = 7.95, p < .01. When
to at least one of the items of the CBQ. Table 2 presents the prev-
assessing the differences by item, we found that they occurred in
alence rates of each type of CB. The most frequent behaviors were
the behaviors of recording humiliating images of classmates, v2(2,
intentionally excluding a classmate from an online group (20.2%),
n = 1380) = 8.45, p < .05, recording physical aggressions, v2(2,
hanging jokes, rumors, gossip, or embarrassing comments about
n = 1380) = 10.41, p < .01, sending images of physical aggression,
a classmate on the Internet (20.1%), sending the link of such com-
v2(2, n = 1380) = 8.72, p < .05, and sending images of a sexual nature,
ments to others (16.8%), and hacking in order to send messages by
v2(2, n = 1380) = 8.27, p < .05. The differences were observed espe-
e-mail that could cause trouble for the victim (18.1%). The two
cially for the response category ‘‘often”. So, 1.8% of the boys versus
forms of CB known as happy slapping (filming someone while they
0.1% of the girls often recorded physical aggressions, 2% of the boys
are forced to do something humiliating or filming someone while
versus 0.4% of the girls recorded humiliating images of a classmate,
they are being attacked) were indicated by 10.4 and 10.5%, respec-
2.14% of the boys versus 0.4% girls sent images of the recorded phys-
tively, of the adolescents.
ical aggressions, and 1.5% of the boys versus 0.1% of the girls sent
The content of the responses to the open questions were ana-
images of classmates of a sexual nature.
lyzed. Examples of Items 3 and 4 were ‘‘changing clothes in the
The total frequency of CB was calculated by adding the responses
locker room”, ‘‘bathing nude in the river”, ‘‘manipulated photo-
to the 16 CBQ items and an analysis of variance was carried out to as-
sess the differences as a function of gender and school level. Table 3
Table 2 shows the means and standard deviations obtained. For school
Prevalence rates per items. grade, statistically significant differences were observed,
F(3, 1390) = 25, p < .001. Subsequent comparisons (Tukey’s method)
Sometimes Often Total
indicated that the frequency of CB behaviors was significantly higher
1. Sending threatening or insulting messages by 14.2 1.6 15.8
in second and third grade of secondary education than in first and
e-mail
2. Sending threatening or insulting messages by 14.2 1.5 15.7 fourth grade, p < .05. There were no significant differences between
cell phone second and third grade. No significant gender differences were found
3. Hanging humiliating images of classmates on 9.0 1.0 10 in CB frequency, M = 2.15 and SD = 5 in girls versus M = 2.53 and
the Internet SD = 4.99 in boys, F(1, 1390) = 2.69, ns. However, boys scored higher
4. Sending links of humiliating images to other 8.2 0.9 9.1
people for them to see
than girls in all the other aggressive behaviors (proactive, reactive,
5. Writing embarrassing jokes, rumors, gossip, 18.3 1.8 20.1 direct and indirect).
or comments about a classmate on the To assess the association between CB behavior and other indica-
Internet tors of aggressive behavior, we carried out multiple regression
6. Sending links with rumors, gossip, etc. about 15.5 1.3 16.8
analysis including the scores in proactive aggressive behavior,
a classmate to other people so they can read
them reactive aggressive behavior, direct aggressive behavior, indirect/
7. Hacking to send messages by e-mail that 15.5 2.6 18.1 relational aggressive behavior, and justification of violence as pre-
could make trouble for the other person dictor variables. This model explained 13% of the variance (R2 = .13,
8. Recording a video or taking pictures by cell 9.4 1.0 10.4 p < .001). Table 4 shows the results. The total CB score was only sig-
phone while a group laughs and forces
another person to do something humiliating
nificantly associated with proactive aggressiveness and beliefs that
or ridiculous justify violence.
9. Sending these images to other people 9.6 1.5 11.1 Lastly, another regression model was estimated, including as
10. Recording a video or taking pictures by cell 9.6 0.9 10.5 predictor variables the contextual variables rejection by others,
phone while someone hits or hurts another
acceptance by others, perceived social support, and exposure to
person
11. Sending these recorded images to other 10.0 1.3 11.3
people
12. Broadcasting online other people’s secrets, 13.3 1.3 14.6 Table 3
compromising information or images Frequency of CB as a function of academic grade and gender.
13. Deliberately excluding someone from an 18.1 2.1 20.2 First grade Second Third grade Fourth Total
online group of ESO of ESO of ESO grade of ESO
14. Sending messages massively that include 8.3 0.9 9.2 n = 389 n = 353 n = 369 n = 300
threats or are very intimidating
15. Recording a video or taking cell phone 8.4 0.7 9.1 Female 0.76 (1.81) 4.17 (6.98) 2.40 (5.08) 1.19 (1.75) 2.15 (4.73)
pictures of classmates performing some kind Male 1.27 (2.69) 3.41 (5.63) 3.46 (6.28) 2.05 (4.38) 2.53 (5.00)
of behavior of a sexual nature Mean (SD) 1.02 (2.32) 3.82 (6.39) 2.93 (5.73) 1.56 (3.19) 2.33 (4.86)
16. Sending these images to other people 7.7 0.9 8.6
Note: ESO, Educación Secundaria Obligatoria (compulsory secondary education).
Author's personal copy
Table 4 confirmed that they had recently had severe cases of CB. Moreover,
Indicators of aggressive behavior associated with CB. the adolescents were not surprised at the questions, but instead
B SE b t they seemed to be familiar with CB. In fact, some adolescents
Proactive aggressiveness .52 .06 .34 8.29** who said they had not participated in any CB acts wrote in the
Reactive aggressiveness .05 .06 .04 0.90 comments section that they had seen other classmates perform
Direct aggressiveness .06 .06 .03 0.93 such acts.
Relational aggressiveness .00 .07 .00. 0.06 It is important to note that the prevalence rate of each type of
Justification of violence .07 .03 .08 2.20*
CB behavior is lower when attending only to the response choice
*
p < .05. often, which better matches the conception of CB defined as an
**
p < .001. aggressive behavior that is repeated over time. Nevertheless, we
think that carrying out CB acts sometimes is also sufficiently severe
to be taken into account in the prevalence rates.
Table 5
The second goal of the study consisted of identifying the cyber-
Contextual variables associated with CB.
bully profile. Coinciding with various previous studies, the boys
B SE b t displayed more frequent use of CB than the girls (e.g., Dehue
Rejection by others .003 .17 .00 0.02 et al., 2008). Furthermore, we studied differences as a function of
Acceptance by others .031 .17 .01 0.19 the items, observing that such differences were particularly pres-
Perceived social support .122 .04 .10 3.10*
ent in the items related to happy slapping. This modality of CB,
Exposure to violence .057 .01 .13 4.21**
in contrast to the others, also involves the use of violence in a real
*
p < .05. setting. This is consistent with previous findings that have found
**
p < .001.
that boys are physically more aggressive than girls, but they use
some forms of internet bullying (telling lies about students
violence. This model only explained 2.5% of the variance of CB through e-mail) in the same way (Williams & Guerra, 2007). The
(R2 = .025, p < .001). Table 5 shows the results. CB was positively results also suggest that the peak frequency of CB is between the
associated with exposure to violence and negatively with per- second and third year of Secondary Education (13–15 years). Wil-
ceived social support. liams and Guerra (2007) also found the highest prevalence in 8th
grade (13-year-olds) comparing both with 5th grade (10-year-
4. Discussion olds) and 11th grade (16-year-olds).
With regard to the relation of CB with the other indicators of
The first goal of the study consisted of developing a question- violence, CB was significantly associated with the justification of
naire that included a broad array of CB behaviors. The CBQ includes violence, as reported in the study of Williams and Guerra (2007),
16 of such behaviors and has shown excellent psychometric prop- and in accordance with the extensive literature that links beliefs
erties insofar as concerns the factor structure and internal in the justification of violence to the use of aggression (Espelage
consistency. & Swearer, 2003; Huesmann, 1988).
The most frequent CB modalities were writing embarrassing ru- Moreover, as expected, CB was related to the use of proactive
mors or comments about classmates on the Internet, sending this aggression, which is carried out coldly and in order to achieve some
link to another person, deliberately excluding someone from an goal. In this sense, this result is coherent with the studies that con-
online group, and hacking a classmate in order to send trouble- ceptualize traditional bullying as essentially proactive aggression
making e-mail messages to others in the victim’s name. The high (Roland & Idsøe, 2001; Unnever, 2005). However, in contrast to our
rate of this last modality is surprising. However, it coincides with expectations, CB was not associated with relational aggression. This
the results obtained by Vandebosch and Van Cleemput (2008), shares contents with some types of CB, for example, excluding some-
who used focus groups and found that one of the most frequently one from the group or spreading rumors. An explanation of this lack
mentioned topics was hacking. Many students admitted that they of association may lie in the conditions under which many CB acts
(or someone they knew) had been a victim of hacking. For example, are carried out (anonymity, impersonal environment and lack of
someone had broken into their MSN account and had changed the consequences for the aggressor), which may cause adolescents
password and sent insulting or weird messages to their contacts. who would otherwise never dare to perform forms of violence in
The total prevalence of CB when the sometimes and often response the school setting to do so through electronic settings (Hinduja &
categories were included was 44.1, which approaches that obtained Patchin, 2008). A second explanation of the lack of association with
by Aricak et al. (2008), who found a prevalence rate of 35.7%. How- the scores in direct and relational aggression lies in the fact that
ever, the prevalence we obtained is much higher than that reported these scores were based on sociometric measures, whereas CB was
in most previous studies (e.g., Li, 2007a, 2007b; Ortega et al., 2008; assessed by means of self-reports.
Smith et al., 2008). One of the reasons for the high rate obtained in In support of this explanation, it is important to note that CB was
this study may be the instrument employed, which assesses a broad not associated with the sociometric indicators of rejection and
spectrum of CB acts, so there is a higher likelihood that the adoles- acceptance by others, despite the fact that previous studies of bully-
cents will respond affirmatively to at least one type of CB. In accor- ing and other forms of aggression have found significant relation-
dance with this interpretation, the study of Aricak et al. also used ships (Card & Little, 2006; Dodge et al., 2006; Laird et al., 2001).
an instrument with many CB items. In fact, in the present study, More specifically, this result does not support the hypothesis devel-
the prevalence rates of each of type CB ranged between 8.7 (sending oped by Piazza and Bering (2009), who proposed that relational
images of a classmate of a sexual nature) and 20.2 (deliberately cyberbullying would be initiated by high-status adolescents. In con-
excluding a classmate from an online group). These values are con- trast, perceived peer social support was significantly associated with
sistent with the prevalence rates obtained in the studies that em- CB. Adolescents who performed CB were characterized by having a
ployed one or a few CB items (e.g., Dehue et al., 2008; Hinduja & lower perception of social support from their friends. Williams and
Patchin, 2008; Li, 2006; Li, 2007a, 2007b). Guerra (2007) also found that less peer support predicted all the
Independently of the type of instrument, the data may also ex- types of bullying including internet bullying. Future research should
press an increase in the problem. When carrying out the study, the explore this aspect in more detail because it suggests that isolation
headmasters of various centers from which the data were collected and poor social relationships can act as risk factors for CB.
Author's personal copy
Crick, N. R., & Grotpeter, J. K. (1995). Relational aggression, gender, and social- Ortega R., Calmaestra, J., & Mora-Merchán, J. A. (2007). Cuestionario cyberbullying.
psychological adjustment. Child Development, 66, 710–722. Universidad de Córdoba, unpublished manuscript.
Dehue, F., Bolman, C., & Völlink, T. (2008). Cyberbullying: Youngsters’ experiences Ortega, R., Calmaestra, J., & Mora-Merchán, J. (2008). Cyberbullying: un estudio
and parental perception. CyberPsychology & Behavior, 11, 217–223. exploratorio en educación secundaria. International Journal of Psychology and
Dodge, K. A. (1991). The structure and function of reactive and proactive aggression. Psychological Therapy, 8, 183–192.
In D. J. Pepler & K. H. Rubin (Eds.), The development and treatment of childhood Orue, I., & Calvete, E. (2008, July). Exposure to violence, justification of violence beliefs
aggression (pp. 201–218). Hillsdale, NJ: Erlbaum. and aggressive behavior in children. Paper presented at the eighteenth world
Dodge, K. A., Coie, J. D., & Lynam, D. (2006). Aggression and antisocial behavior in meeting of the International Society for Research on Aggression, Budapest,
youth. In N. Eisenberg (Ed.). Handbook of child psychology (Vol. 3, pp. 719–788). Hungary.
New York: Wiley. Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard. A
Dodge, K. A., Lansford, J. E., Burks, V. S., Bates, J. E., Pettit, G. S., Fontaine, R., et al. preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4,
(2003). Peer rejection and social information processing factors in the 148–169.
development of aggressive behavior problems in children. Child Development, Piazza, J., & Bering, J. M. (2009). Evolutionary cyber-psychology: Applying an
74, 374–393. evolutionary framework to internet behavior. Computers in Human Behavior, 25,
Espelage, D. L., & Swearer, S. M. (2003). Research on school bullying and 1258–1269.
victimization: What have we learned and where do we go from here? School Price, J. M., & Dodge, K. A. (1989). Reactive and proactive aggression in childhood:
Psychology Review, 32, 365–383. Relations to peer status and social context dimensions. Journal of Abnormal Child
Flannery, D. J., Wester, K. L., & Singer, M. I. (2004). Impact of exposure to violence in Psychology, 17, 455–471.
school on child and adolescent mental health and behavior. Journal of Prinstein, M. J., & La Greca, A. M. (2004). Childhood peer rejection and aggression as
Community Psychology, 32, 559–573. predictors of adolescent girls’ externalizing and health risk behaviors: A 6-year
Galen, B. R., & Underwood, M. K. (1997). A developmental investigation of social longitudinal study. Journal of Consulting and Clinical Psychology, 72, 103–112.
aggression among children. Developmental Psychology, 33, 589–600. Raine, A., Dodge, K. A., Loeber, R., Gatzke-Kopp, L., Lynam, D., Reynolds, C., et al.
Gorman-Smith, D., Henry, D. B., & Tolan, P. H. (2004). Exposure to community (2006). The reactive–proactive aggression questionnaire: Differential correlates
violence and violence perpetration: The protective effects of family functioning. of reactive and proactive aggression in adolescent boys. Aggressive Behavior, 32,
Journal of Clinical Child and Adolescent Psychology, 33, 439–449. 159–171.
Grupo de trabajo de la Sociedad Española de Epidemiologia y de la Sociedad Roland, E., & Idsøe, T. (2001). Aggression and bullying. Aggressive Behavior, 27,
Española de Medicina de Familia y Comunitaria (2000). Una propuesta de 446–462.
medida de clase social (Proposal for a social class measure). Atención Primaria, Salmivalli, C., Kaukiainen, A., & Lagerspetz, K. (2000). Aggression and sociometric
25, 350–363. status among peers: Do gender and type of aggression matter? Scandinavian
Harold, G. T., & Conger, R. D. (1997). Marital conflict and adolescent distress: The Journal of Psychology, 41, 17–24.
role of adolescent awareness. Child Development, 68, 333–350. Schwartz, D., Dodge, K. A., Coie, J. D., Hubbard, J. A., Cillessen, A. H. N., Lemerise, E. A.,
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors et al. (1998). Social-cognitive and behavioral correlates of aggression and
related to offending and victimization. Deviant Behavior, 29, 129–156. victimization in boys’ play groups. Journal of Abnormal Child Psychology, 26,
Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure 431–440.
analysis: Conventional criteria versus new alternatives. Structural Equation Schwartz, D., & Proctor, L. J. (2000). Community violence exposure and children’s
Modeling, 6, 1–55. social adjustment in the school peer group: The mediating roles of emotion
Huesmann, L. R. (1988). An information processing model for the development of regulation and social cognition. Journal of Consulting and Clinical Psychology, 68,
aggression. Aggressive Behavior, 14, 13–24. 670–683.
Huesmann, L. R., & Guerra, N. G. (1997). Children’s normative beliefs about Smith, P. (2006). Ciberacoso: naturaleza y extensión de un nuevo tipo de acoso dentro y
aggression and aggressive behavior. Journal of Personality and Social Psychology, fuera de la escuela. Paper presented at Education Congress, Palma de Mallorca,
72, 408–419. Spain.
Huesmann, L. R., Moise-Tisus, J., Posolski, C. L., & Eron, L. D. (2003). Smith, P., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into
Longitudinal relations between children’s exposure to TV violence and cyberbullying, its forms, awareness and impact, and the relationship between age
violent behavior in young adulthood: 1977–1992. Developmental Psychology, and gender in cyberbullying. Research Brief No. RBX03-06. London: DfES.
39, 201–221. Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Jöreskog, K. G., & Sörbom, D. (2006). LISREL 8.8 for Windows. Lincolnwood, IL: Cyberbullying: Its nature and impact in secondary school pupils. The Journal of
Scientific Software International Inc.. Child Psychology and Psychiatry, 49, 376–385.
Laird, R. D., Jordan, K. Y., Dodge, K. A., Pettit, G. S., & Bates, J. E. (2001). Peer rejection Solberg, M. E., & Olweus, D. (2003). Prevalence estimation of school bullying with
in childhood, involvement with antisocial peers in early adolescence, and the the Olweus Bully/Victim Questionnaire. Aggressive Behavior, 29, 239–268.
development of externalizing behavior problems. Development and Stevens, V., De Bourdeaudhuij, I., & Van Oost, P. (2001). Anti-bullying interventions
Psychopathology, 13, 337–354. at school: Aspects of programme adaptation and critical issues for further
Landeta, O., & Calvete, E. (2002). Adaptación y validación de la Escala programme development. Health Promotion International, 16, 155–167.
Multidimensional de Apoyo Social Percibido (Adaptation and validation of the Unnever, J. D. (2005). Bullies, aggressive victims, and victims: Are they distinct
multidimensional scale of perceived social support). Revista de Ansiedad y Estrés, groups? Aggressive Behavior, 31, 153–171.
8, 173–182. Vandebosch, H., & Van Cleemput, K. (2008). Defining cyberbullying: A qualitative
Li, Q. (2006). Cyberbullying in schools. A research of gender differences. School research into the perceptions of youngsters. CyberPsychology & Behavior, 11,
Psychology International, 27, 157–170. 499–503.
Li, Q. (2007a). New bottle but old wine: A research of cyberbullying in schools. Willard, N. E. (2006). Cyberbullying and Cyberthreats: Responding to the challenge of
Computers in Human Behavior, 23, 1777–1791. online social cruelty, threats, and distress. Eugene, Oregon: Center for Safe and
Li, Q. (2007b). Bullying in the new playground: Research into cyberbullying and Responsible Internet Use.
cyber victimization. Australasian Journal of Educational Technology, 23, 435–454. Willard, N. E. (2007). An Educatoŕs Guide to Cyberbullying and Cyberthreats.
Li, Q. (2008). A cross-cultural comparison of adolescents’ experience related to Available from http://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf
cyberbullying. Educational Research, 50, 223–234. Retrieved 15 February 2008.
Little, T. D., Slegers, D. W., & Card, N. A. (2006). A non-arbitrary method of Williams, K. R., & Guerra, N. G. (2007). Prevalence and predictors of internet
identifying and scaling latent variables in SEM and MACS models. Structural bullying. Journal of Adolescent Health, 41, 14–21.
Equation Modeling, 13, 59–72. Ybarra, M. L., & Mitchell, K. J. (2004). Online aggressors/targets, aggressors, and
Miller-Johnson, S., Coie, J. D., Maumary-Gremaud, A., & Bierman, K.the Conduct targets: A comparison of associated youth characteristics. Journal of Child
Problems Prevention Research Group. (2002). Peer rejection and aggression and Psychology and Psychiatry, 45, 1308–1316.
early starter models of conduct disorder. Journal of Abnormal Child Psychology, Zimet, G. D., Dahlem, N. W., Zimet, S. G., & Farley, G. K. (1988). The
30, 217–230. multidimensional scale of perceived social support. Journal of Personality
Olweus, D. (1993). Bullying at school: What we know and what we can do. Oxford: Assessment, 52, 30–41.
Blackwell. Zimet, G. D., Powell, S. S., Farley, G. K., Werkman, S., & Berkoff, K. A. (1990).
Olweus, D., & Limber, S. (1999). Bullying prevention program. Boulder, CO: Center for Psychometric characteristics of the Multidimensional Scale of Perceived Social
the Study and Prevention of Violence. Support. Journal of Personality Assessment, 55, 610–617.