RISK FACTORS ASSOCIATED WITH CYBERBULLYING VICTIMIZATION AND PERPETRATION AMONG TAIWANESE CHILDREN by MI-TING LIN, BA, MS... RISK FACTORS ASSOCIATED WITH CYBERBULLYING VICTIMIZATION AND
Trang 1RISK FACTORS ASSOCIATED WITH CYBERBULLYING VICTIMIZATION AND
PERPETRATION AMONG TAIWANESE CHILDREN
by MI-TING LIN, BA, MS
Trang 2Copyright
by Mi-Ting Lin, BA, MS, PhD
2016
Trang 3RISK FACTORS ASSOCIATED WITH CYBERBULLYING VICTIMIZATION AND
PERPETRATION AMONG TAIWANESE CHILDREN
by
MI-TING LIN
MS, Soochow University, 2007
BA, National Taipei University, 2003
Presented to the Faculty of The University of Texas
School of Public Health
in Partial Fulfillment
of the Requirements for the Degree of
DOCTOR OF PHILOSOPHY
THE UNIVERSITY OF TEXAS SCHOOL OF PUBLIC HEALTH
Houston, Texas May, 2016
Trang 4All rights reservedINFORMATION TO ALL USERSThe quality of this reproduction is dependent upon the quality of the copy submitted.
In the unlikely event that the author did not send a complete manuscript
and there are missing pages, these will be noted Also, if material had to be removed,
a note will indicate the deletion
All rights reserved
This work is protected against unauthorized copying under Title 17, United States Code
Microform Edition © ProQuest LLC
ProQuest LLC
789 East Eisenhower Parkway
P.O Box 1346Ann Arbor, MI 48106 - 1346
ProQuest 10126751Published by ProQuest LLC (2016) Copyright of the Dissertation is held by the Author
ProQuest Number: 10126751
Trang 5ACKNOWLEDGEMENTS
I would like to thank all committee members and my family for their support
Trang 6RISK FACTORS ASSOCIATED WITH CYBERBULLYING VICTIMIZATION AND
PERPETRATION AMONG TAIWANESE CHILDREN
Mi-Ting Lin, BA, MS, PhD The University of Texas School of Public Health, 2016
Dissertation Chair: Christine Markham, PhD
In Taiwan, a previous study indicates that 18.4% of adolescents were cyberbullying victims, 5.8% were perpetrators, and 11.2% were both The aims of the present study were to determine whether time spent online, risky Internet usage, and parental supervision were risk factors of cyberbullying victimization (study 1), explorethe mechanism underlying the relationship between cyberbullying victimization and perpetration (study 2), and examine the risk factors (time spent online, risky usage, parental supervision, and emotional self-
regulation) of cyberbullying among children, including bullies, victims, and bully-victims (study 3) A 2-wave de-identified secondary data analysis from an elementary school sample (220 5th grade students: Wave 1 and Wave 2, 238 6th grade students: Wave 1 only) in Taiwan was used Logistic regression analysis, mediation analysis, and one-way multivariate analysis of covariance (MANCOVA) were conducted
The results indicated that time spent online and risky usage increased the odds of cyberbullying victimization However, parental supervision failed to predict future
cyberbullying victimization (study 1) The association between cyber victimization and
Trang 7cyberbullying perpetration was mediated by emotional self-regulation (study 2) Compared to victim-onlys, bully-onlys, and neutrals (i.e., youth who experienced neither bullying
victimization nor perpetration), bully-victims demonstrate higher amounts of time spent on the Internet, higher risky Internet usage, lower parental supervision, and lower emotional self-regulation (study 3) Combined, these studies make a significant contribution to the cyberbullying research These findings may contribute to the development of effective
education interventions in children’s Internet usage to avoid cyberbullying
Trang 8TABLE OF CONTENTS
List of Tables i
List of Figures ii
Background 1
Introduction 1
Specific Aims and Hypothesis 4
Public Health Significance 6
Human Subjects, Animal Subjects, or Safety Considerations 6
References 8
Journal Article 1 11
Investigating Antecedents of Cyberbullying Victimization: Application of Routine Activity Theory 11
Computers in Human Behavior 11
Introduction 11
Materials and Methods 17
Results 20
Discussion 20
References 26
Journal Article 2 35
Linking Cyberbullying Victimization to Subsequent Cyberbullying Perpetration: The Mediating Role of Emotional Self-Regulation 35
Cyberpsychology, Behavior, and Social Networking 35
Introduction 35
Materials and Methods 43
Results 45
Discussion 47
References 52
Journal Article 3 61
Risk Factors of Cyberbullying Victims, Bullies, and Bully-Victims in Taiwanese Children 61
Journal of Early Adolescence 61
Introduction 61
Materials and Methods 67
Results 70
Discussion 71
References 78
Trang 9LIST OF TABLES
Table 1 Sample characteristics by cyberbullying status (n = 220) 33
Table 2 The hierarchical binary logistic regression estimates for cyberbullying
victimization 34
Table 3 Indirect effect and direct effect from cyber victimization to cyberbullying
perpetration 46
Table 4 Participants demographic characteristics (n = 458) 84
Table 5 MANCOVA analyses showing associations between risk factors and
participation in cyberbullying 85
Trang 10LIST OF FIGURES
Figure 1 The conceptual model of current study 32 Figure 2 Mediation model of this study 43 Figure 3 Results of the mediator model .46
Trang 11BACKGROUND Introduction
The development of the Internet is rapidly and extensively diffusing worldwide (Ševčíková, 2015; Wang, Bianchi, & Raley, 2005) In addition, the number of Internet users and the amount of time spent online are continuously increasing among children (Child Trends, 2012; Johnson, 2010; Ybarra & Mitchell, 2004) In fact, Internet use has become the major leisure activity for young adolescents For instance, in the past, young adolescents might go to the stadium to play baseball after school, but now they may go back home
directly and play RPG (Role-Playing Games) online In the United States, 83.3% of children and adolescents lived in households equipped with at least one computer in 2013 Close to 75% of children and adolescents lived in households equipped with Internet access (United States Census Bureau, 2014) In Taiwan, 87.3% of families had a least one computer at home and 84.0% families had access to high speed Internet (Taiwan Network Information Center, 2013) In a report form Research, Development and Evaluation Commission, Executive Yuan (2013), 11.6% of children aged 6-11 years had their own desktop computers at home More than 25% of them had their own tablets and 22% had their own smartphones According to Child Welfare League Foundation of Taiwan (2012), close to 85% of children in fifth and sixth grades use the Internet frequently On weekdays, 21.4% of children used the Internet
On weekends, more than 70% of children used the Internet Furthermore, 21.1% of children spent more than 2 hours on the Internet per day More than 30% of children spent more than
3 hours on the Internet per day
Trang 12The increased role of Internet use among children has raised dramatic concern about what and how children may be influenced by Internet use Previous studies indicated that children can use the Internet to gain knowledge and acquire information
(Subrahmanyam, Kraut, Greenfield, & Gross, 2000) According to a significant series of studies conducted at Michigan State University (the HomeNetToo project), Jackson and her colleagues investigated the relationship between using the Internet at home and academic performance among children from low-income families (Jackson et al., 2006) Their results found that Internet use can positively predict children’s reading performance and grade point averages (GPAs) after six months and later Furthermore, the more time children spent online, the higher their reading ability However, Internet use is a two-sided coin The Internet can be misused for misbehaviors, such as cyberbullying (Ševčíková, 2015)
Cyberbullying is an increasing public health concern in children and young adolescents (Centers for Disease Control and Prevention, 2014) According to Hinduja and Patchin (2008), cyberbullying refers to intentional and repeated harm inflicted through electronic devices, such as computers and cell phone, in an electronic context (e.g., email, instant message, and text message) For instance, children have used electronic communication technology to threaten, embarrass, or socially exclude others (Mishna, Saini, & Solomon, 2009) The prevalence of cyberbullying victimization worldwide ranges across studies from 10% to 40% (Kowalski, Giumetti, Schroeder, & Lattanner, 2014) The prevalence of
cyberbullying perpetration worldwide ranges from 5% to 36% (Hemphill, Kotevski, & Heerde, 2015; Rice et al., 2015; Schultze-Krumbholz & Scheithauer, 2015) More than 25%
of the children were both (Mishna, Khoury-Kassabri, Gadalla, & Daciuk, 2012) In Taiwan,
Trang 1318.4% of adolescents were victims of cyberbullying, 5.8% were perpetrators only, and 11.2% were both (Chang, Lee, Chiu, Hsi, Huang, & Pan, 2013)
To date, a major body of research has examined the prevalence, antecedents, and outcomes of cyberbullying, including victims and perpetrators, but several critical gaps in the cyberbullying literature remain First, most previous studies were conducted without
utilizing theory (Kowalski et al., 2014; Tokunaga, 2010) However, theory-based studies can help researchers to identity the potential determinants of cyberbullying and develop related measurements (Kowalski et al., 2014) Namely, the cyberbullying literature needs to develop based on a theoretical foundation Second, the majority of previous studies only focused on two categories of cyberbullying, those who are perpetrators or victims (Mishna et al., 2012) This relationship is based on the premise that victims and perpetrators are different
individuals in the cyberbullying context In fact, research indicates that the experience of bullying victims is related to later cyberbullying misbehaviors (Jang, Song, & Kim, 2014) The children who are both perpetrators and victims have lower self-control, higher offline aggression, and higher peer rejection than perpetrators or victims only (Bayraktar,
Machackova, Dedkova, Cerna, & Ševčíková, 2015) Third, information and communications technology (ICT) is extensively used in Asia Specifically, Internet use among children and youth in Asian countries is increasing dramatically Taiwan is one of the Asian countries that has the most pervasive Internet use (Bhat, Chang, & Ragan, 2013) Greater Internet use may equate to greater cyber-harm The frequency of Internet use could be a predictor of
cyberbullying perpetration and victimization (Dilmaç & Aydoğan, 2010) As such, Internet
Trang 14use increases children’s online interpersonal interactions and may make children’s
misbehaviors more likely happen (Chou, Condron, & Belland, 2005)
Accordingly, in the present study, I attempt to fill these noteworthy gaps and contribute to the cyberbullying literature in three primary ways This study consists of three independent papers that examine Internet use and cyberbullying among Taiwanese children using secondary data from previously conducted study The papers are described below
Specific Aims and Hypothesis
The first paper, “Investigating Antecedents of Cyberbullying Victimization:
Application of Routine Activity Theory,” involves an analysis of secondary data to examine the determinants of cyberbullying victimization by using Routine Activity Theory (Cohen, & Felson, 1979) The specific aim is:
Aim: To determine whether three risky factors identified in Routine Activity
Theory may influence cyberbullying victimization; that is, (a) exposure motivated offenders, (b) target suitability, and (c) lack of capable guardianship
Hypothesis: These three determinants are significantly related to cyberbullying
victimization
The second paper, “Linking cyberbullying victimization to subsequent
cyberbullying perpetration: The mediating role of emotional self-regulation” involves an analysis of secondary data to examine whether cyberbullying may decrease victims’
emotional self-regulation, which in turn may increase their misbehavior (cyberbullying perpetration) by using General Strain Theory (Agnew, 1992)
Trang 15Aim: To examine the role of emotional self-regulation as a mechanism underlying
the relationship between cyber victimization and cyberbullying perpetration
Hypothesis 1: Individuals’ experience of cyberbullying victimization is positively
related to cyberbullying perpetration
Hypothesis 2: Individuals’ experience of cyberbullying victimization is negatively
related to emotional self-regulation
Hypothesis 3: Emotional self-regulation is negatively related to individuals’
cyberbullying perpetration
Hypothesis 4: Emotional self-regulation mediates the relationship between
individuals’ cyberbullying victimization and their cyberbullying perpetration
The third paper, “Risk Factors of Cyberbullying Victims, Bullies, and
Bully-Victims in Taiwanese Children” involves an analysis of secondary data to explore the risk factors of cyberbullying by using Routine Activity Theory (Cohen, & Felson, 1979)
Aim: To examine the risk factors (time spent online, risky usage, parental
supervision, and emotional self-regulation) of cyberbullying among children, including victims, bullies, and bully-victims
Hypothesis 1: Bully-victims demonstrate higher amounts of time spent on the
Internet, higher risky Internet usage, lower parental supervision, and lower emotional regulation, compared to other groups
Trang 16self-Public Health Significance
In the past decade, cyberbullying has been viewed as a worldwide epidemic and considered a highly critical public health problem that can greatly influence children’s health Aside from the contribution to the literature from an empirical viewpoint, this dissertation also provides further insight into the association between cyberbullying and related
determinants among Taiwanese children Previous studies have identified several precursors
of cyberbullying victimization and cyberbullying perpetration However, most the existing cyberbullying literature lacks of a theoretical foundation (Kowalski et al., 2014) In addition, there are few studies that have examined the group of the children who are both
cyberbullying perpetrators and cyberbullying victims Besides, there are limited number of cyberbullying studies in Taiwan (Huang & Chou, 2010) To address the research gaps, the present study uses Routine Activity Theory to explore the precursors of cyberbullying
victimization and cyberbullying perpetration among Taiwanese children Moreover, General Strain Theory is used to exploring the mechanism underlying the relationship between
cyberbullying victimization and cyberbullying among Taiwanese children
Human Subjects, Animal Subjects, or Safety Considerations
The study contains the analysis of previously collected self-reported secondary data from Taiwan No data were linked to personal identification records All data analyzed have been de-identified and therefore pose no risk of identification to study subjects Current approval is HSC-SPH-13-0617 It is determined to qualify for exempt status according to 45
Trang 17CFR 46.101 (b) on 09/09/2013 All data were saved on an encrypted hard drive and saved in
a locked cabinet
Trang 18References
Bayraktar, F., Machackova, H., Dedkova, L., Cerna, A., & Ševčíková, A (2015)
Cyberbullying: The discriminant factors among cyberbullies, cybervictims, and
cyberbully-victims in a Czech adolescent sample Journal of interpersonal violence, 30(18), 3192-3216
Bhat, C S., Chang, S H., & Ragan, M A (2013) Cyberbullying in Asia Education about Asia, 18(2), 36-39
Centers for Disease Control and Prevention (2014) Electronic Aggression: Technology and Youth Violence Retrieved from
http://www.cdc.gov/violenceprevention/youthviolence/electronicaggression/
Chang, F., Lee, C., Chiu, C., Hsi, W., Huang, T., & Pan, Y (2013) Relationships among
cyberbullying, school bullying, and mental health in Taiwanese adolescents Journal of School Health, 83(6), 454-462
Chou, C., Condron, L., & Belland, J C (2005) A review of the research on internet
addiction Educational Psychology Review, 17(4), 363-388
Child Trends (2012) Home computer access and Internet use Retrieved from
http://www.childtrendsdatabank.org/?q=node/298
Child Welfare League Foundation of Taiwan (2012) Internet use and related behaviors among children and youth in Taiwan, 2012 Retrieved from http:
http://www.children.org.tw/news/advocacy_detail/354
Cohen, L E., & Felson, M (1979) Social change and crime rate trends: A routine activity
approach American Sociological Review, 44(4), 588-608
Dilmaç, B., & Aydoğan, D (2010) Parental attitudes as a predictor of cyber bullying among
primary school children International Journal of Psychological and Brain Sciences, 5(10), 649-653
Huang, Y Y., & Chou, C (2010) An analysis of multiple factors of cyberbullying among
junior high school students in Taiwan Computers in Human Behavior, 26(6),
1581-1590
Trang 19Hemphill, S A., Kotevski, A., & Heerde, J A (2015) Longitudinal associations between cyber-bullying perpetration and victimization and problem behavior and mental health
problems in young Australians International journal of public health, 60(2), 227-237
Hinduja, S., & Patchin, J W (2008) Cyberbullying: An exploratory analysis of factors
related to offending and victimization Deviant Behavior, 29(2), 129-156
Jackson, L A., Samona, R., Moomaw, J., Ramsay, L., Murray, C., Smith, A., & Murray, L (2007) What children do on the internet: Domains visited and their relationship to
socio-demographic characteristics and academic performance Cyberpsychology & Behavior, 10(2), 182-190
Jang, H., Song, J., & Kim, R (2014) Does the offline bully-victimization influence
cyberbullying behavior among youths? Application of General Strain Theory
Computers in Human Behavior, 31, 85-93
Johnson, G M (2010) Internet Use and Child Development: The Techno-Microsystem
Australian Journal of Educational & Developmental Psychology, 10, 32-43
Kowalski, R M., Giumetti, G W., Schroeder, A N., & Lattanner, M R (2014) Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among
youth Psychological Bulletin, 140(4), 1073-1137
Mishna, F., Khoury-Kassabri, M., Gadalla, T., & Daciuk, J (2012) Risk factors for
involvement in cyber bullying: Victims, bullies and bully–victims Children and Youth Services Review, 34(1), 63-70
Mishna, F., Saini, M., & Solomon, S (2009) Ongoing and online: Children and youth's
perceptions of cyber bullying Children and Youth Services Review, 31(12), 1222-1228 Research, Development and Evaluation Commission, Executive Yuan (2013) A survey of digital learning and opportunities of children ages 6 to11 years old Retrieved from
http://www.ndc.gov.tw/dn.aspx?uid=15601
Rice, E., Petering, R., Rhoades, H., Winetrobe, H., Gold
bach, J., Plant, A., & Kordic, T (2015) Cyberbullying Perpetration and Victimization
among Middle-School Students American Journal of Public Health, 105(3), 66-72
Trang 20Schultze-Krumbholz, A., & Scheithauer, H (2014) Cyberbullying In Gullotta, T P., Plant,
R W., & Evans, M (Eds), Handbook of Adolescent Behavioral Problems: Based Approaches to Prevention and Treatment (pp 415-428) Springer, New York
Evidence-Ševčíková, A (2015) Two sides of the same coin: communication technology, media use,
and our kids’ health International journal of public health, 60(2), 129-130
Subrahmanyam, K., Kraut, R E., Greenfield, P M., & Gross, E F (2000) The impact of
home computer use on children's activities and development The Future of Children, 10(2), 123-144
Taiwan Network Information Center (2013) The use of high speed Internet in Taiwan
Retrieved from http://www.myhome.net.tw/2013_10/p02.htm
Tokunaga, R S (2010) Following you home from school: A critical review and synthesis of
research on cyberbullying victimization Computers in Human Behavior, 26(3),
277-287
United States Census Bureau (2014) Computer and Internet use in the United States: 2013
U.S Department of Commerce Economics and Statistics Administration
Wang, R., Bianchi, S M., & Raley, S B (2005) Teenagers’ Internet use and family rules: A
research note Journal of Marriage and Family, 67(5), 1249-1258
Ybarra, M L., & Mitchell, K J (2004) Online aggressor/targets, aggressors, and targets: A
comparison of associated youth characteristics Journal of Child Psychology &
Psychiatry, 45(7), 1308-1316
Trang 21JOURNAL ARTICLE 1 Investigating Antecedents of Cyberbullying Victimization: Application of Routine Activity Theory
Computers in Human Behavior
Introduction
The Internet has a significant impact on children’ cyberbullying behaviors
Although research on aggression has dramatically increased in the last decade to identify and integrate the antecedents and outcomes of bullying (Cook, Williams, Guerra, Kim, & Sadek, 2010; Gini & Pozzoli, 2009; Merrell, Gueldner, Ross, & Isava, 2008; Reijntjes, Kamphuis, Prinzie, & Telch, 2010; Ttofi, Farrington, Lösel, & Loeber, 2011), Internet use has changed the face of bullying behaviors (Smith et al., 2008) As more people utilize the Internet
frequently for school, work, and social use, Internet usage has evolved behaviors from a physical context to an electronic context For example, children aged 12-15 years now spend more time on the Internet (increasing from 14.9 hours to 17.1 hours a week), and
communicating with their friends through instant message, blogs, and social networking sites (SNSs) than ever before (Chiribuca & Răcătău, 2013) As such, Internet use increases
children’s online interpersonal interactions and may make misbehavior (e.g., cyberbullying) more likely to happen (Chou, Condron, & Belland, 2005) According to recent research in the United States, about 15.2% of children and adolescents reported having been cyberbullied (Kowalski & Limber, 2013) Prevalence estimates of cyberbullying victims worldwide were between 10% and 40% (Kowalski, Giumetti, Schroeder, & Lattanner, 2014) Specifically, regarding the prevalence of cyberbullying in Taiwan, an investigation reported that 18.4% of
Trang 22adolescents were victims of cyberbullying, 5.8% were perpetrators only, and 11.2% were both victim and perpetrator (Chang et al., 2013) These numbers suggest that cyberbullying has become a public health issue in Taiwan Overall, these findings indicate that
cyberbullying is a serious public health problem and a worldwide epidemic
Cyberbullying is generally described as an extension of traditional bullying
Traditional bullying is a subcategory of aggression, referring to negative acts that are
intentionally carried out by one or more perpetrators and targeted toward victims who cannot easily defend themselves against the perpetrators over time (Hemphill et al., 2012; Olweus, 1993) Cyberbullying is similar to bullying in that it is an aggressive action with various forms of power imbalance between perpetrators and victims, especially victims who are unable to protect themselves from perpetrators (Dooley, Pyżalski, & Cross, 2009; Olweus, 1993; Vandebosch & Van Cleemput, 2008) Moreover, bullying behaviors include covert (e.g., spreading rumors and social exclusion) or overt (e.g., verbal and physical abuse) acts (Hemphill et al., 2012; Spears, Slee, Owens, & Johnson, 2009) Cyberbullying comprises both covert and overt bullying actions in an electronic context by using electronic devices (e.g., computers and smart phones) Through various forms of electronic media, individuals can bully, exclude, abash, and humiliate their victims, as well as distribute insulting E-mails
or texts to other people (Bossler & Holt, 2009; Li, 2007) As with the negative effects of traditional bullying, cyberbullying has detrimental effects on victims’ emotions (e.g.,
negative mood), psychological well-being (e.g., anxiety and depression), and subsequent behaviors (e.g., suicide and substance abuse) (Chang et al., 2013; Dempsey, Sulkowski, Nichols, & Storch, 2009; Juvonen & Gross, 2008; Sourander et al., 2010; Ybarra & Mitchell,
Trang 232007) However, there are some distinctive characteristics of cyberbullying compared to traditional bullying: First, cyberbullying perpetrators can be anonymous and may not need to face their victims In so doing, cyberbullying perpetration can occur in an indirect way Second, cyberbullying perpetrators can bully large numbers of victims with less effort Lastly, cyberbullying perpetrators can reach victims without any geographic impediments at any time during the day or night (Erdur-Baker, 2010; Heirman & Walrave, 2008; Katzer, Fetchenhauer, & Belschak, 2009; Kowalski, Limber, & Agatston, 2008)
Some significant determinants of cyberbullying victimization, including (a)
personal and (b) situational factors, have been identified by prior research (Kowalski, e al., 2014) First, the personal factors include individual characteristics, personality, psychological states, Internet use, and delinquent behaviors Specifically, findings demonstrated that female students are likely to experience more cyberbullying victimization than male students
(Sourander et al., 2010), and early adolescents (i.e., fifth to eighth grade) reported the most cyberbullying victimization compared to different ages (Hinduja & Patchin, 2008)
Furthermore, other research indicated that narcissism, self-esteem, depression, anxiety, technology use, and socioeconomic status are related to cyberbullying victimization Second, the situational factors include parental involvement and school climate (Kowalski, e al., 2014) For instance, parental discussion about online behavior and parental control of
technology are related to less cyberbullying victimization (Cassidy, Brown, & Jackson, 2012; Mesch, 2009) Additionally, youth who perceive the school climate as being unfair,
distrusting, and hostile may have increased vulnerability to cyberbullying victimization (Li, 2006; Mason, 2008)
Trang 24Although research on cyberbullying has rapidly developed and previous findings have provided important insights, some gaps in understanding still remain Specifically, some findings in previous research lack a theoretical framework to support their outcomes
Consistent with this perspective of the limitation in the existing cyberbullying literature, Kowalski et al (2014) called for future researchers to develop a more solid theoretical
foundation of cyberbullying victimization and perpetration Even though accumulated
research, drawing on general aggression models (e.g., Gullone & Robertson, 2008; Vannucci, Nocentini, Mazzoni, & Menesini, 2012), social information processing (e.g., Camodeca, Goossens, Schuengel, & Terwogt, 2003; Crick & Dodge, 1994), and social cognitive theory (e.g., Toblin, Schwartz, Gorman, Abou-ezzeddine, 2005), has identified the antecedents and consequences of bullying victimization, the routine activity theory (Cohen, & Felson, 1979) may advance our understanding and provide theoretical guidelines of why personal and situational factors are related to cyberbullying victimization Routine activity theory posits that victimization usually occurs when victims are placed in hazardous contexts which cannot protect individuals from offenders and when they are exposed to risky factors Key constructs include: (a) target suitability, referring to a person’s availability as a victim and attractiveness
to the offender, (b) a lack of a capable guardian, referring to the lack of abilities or resources
to protect themselves from victimization, and (c) a motivated offender, referring to a person who intends to participate in perpetration when opportunities are presented (Cohen, &
Felson, 1979; see Figure 1) In short, routine activity theory asserts that victimization and perpetration are not random incidents, but regular patterns if an offender intends to target a suitable person who has no adequate guardianship
Trang 25Routine activity theory can provide a theoretical explanation to clarify the
determinants of cyberbullying victimization (Holt, Fitzgerald, Bossler, Chee, & Ng, 2014) For example, research has found that individuals who spend more time online increase their likelihood of cyberbullying victimization (Dilmaç & Aydoğan, 2010) In fact, Internet use can increase exposures to motivated offenders Moreover, female Internet users who are generally seen as more attractive targets often report higher levels of sexual harassment online than male Internet users (Biber, Doverspike, Baznik, Cober, & Ritter, 2002) Measures
of guardianship have focused on computer filtering software and computer skills (Holt et al., 2014); however, these measures ignore other important situational factors (e.g., parental supervision) Furthermore, most research on cyberbullying victimization utilizing routine activity theory has targeted high school or college students as respondents (e.g., Bossler & Holt, 2009; Holt, Fitzgerald, Bossler, Chee, & Ng, 2014; Marcum, Higgins, & Ricketts, 2010) However, the greatest frequency of cyberbullying behavior usually occurs in seventh and eighth grades (i.e., early adolescence) and then significantly decreases after tenth grade (Tokunaga, 2010) Thus, it appears that routine activity theory can be applied to link some important factors to cyberbullying victimization, but future research needs to consider other applicable measures of guardianship (e.g., parental supervision) and theoretically appropriate populations
Accordingly, the main purpose of the current study is to examine the determinants
of cyberbullying victimization in an early adolescent population In doing so, first, in line with routine activity theory, I clarify three risk factors which may influence cyberbullying victimization; that is, (a) exposure to motivated offenders, (b) target suitability, and (c) lack
Trang 26of capable guardianship Specifically, I anticipate that these three determinants are
significantly related to cyberbullying victimization The current study targets the childhood population with the highest cyberbullying prevalence rates (Tokunaga, 2010), i.e., early adolescents Lastly, previous research suggests that children from different cultures and countries may exhibit different cyberbullying behaviors (Li, 2007) Hence, it is imperative to examine cyberbullying and cyberbullying victimization in a cross-cultural context Taiwan is seen as one representation of collectivism (Ali, Lee, Hsieh, & Krishnan, 2005), and children are taught to increase the harmony of interpersonal relationships, self-regulation, and
tolerance (Wang, & Tamis-Lemonda, 2003) Thus, the current study focuses on children in Taiwan to test my hypotheses: that is, (a) exposure to motivated offenders, (b) target
suitability, and (c) lack of capable guardianship are significantly associated with
cyberbullying literature (Kowalski et al., 2014) Furthermore, I consider appropriate
measures of capable guardianship and assess children’s parental controls as guardians to advance our knowledge of protective factors of cyberbullying Finally, the present study targets Taiwanese children to understand cyberbullying behaviors in different cultural contexts Overall, I believe that the findings of the current study can illuminate the
cyberbullying victimization among Taiwanese children and suggest tentative directions for
Trang 27parents and educators to reduce cyberbullying through intervention that can increase
children’s protective factors
Materials and Methods
Participants
This study used de-identified secondary data analysis of school-based health surveillance from an elementary school in Taoyuan, Taiwan These health surveillance data were from a 2-wave, prospective study of multi-media use behaviors among 5th grade
students (Wave 1 and Wave 2) and 6th grade students (Wave 1 only) Fifth grade and 6thgrade students in Taiwan are usually 11 to 13 years old In Wave 1, all the 5th and 6th grade students were invited to participate in the survey in March, 2013 In Wave 2, all the 5th grade students were invited to participate in the survey in June, 2013 Students who agreed to participate and provided signed parental consent forms were invited to join the school-based health surveillance study Only the 5th grade students with Wave 1 and Wave 2 data was
analyzed in this study
Measures
All the demographic variables (age and gender) and three elements of routine activity theory (exposure to motivated offenders, target suitability, and lack of capable
guardianship) were assessed at Wave 1 Cyber victimization was assessed at Wave 2
Independent variable 1: Exposure to Motivated Offenders (Wave 1)
Time spent online was used to assess exposure to motivated offenders It was captured by the following two questions: “How much time do you spend online on an
average school day?” and “How much time do you spend online on an average weekend?” (0
Trang 28= never, 1 = l-30 minutes, 2 = 31-60 minutes, 3 = more than 1 hour to 2 hours, 4 = more than
2 hours to 4 hours, 5 = more than 4 hours to 6 hours, 6 = more than 6 hours) Summary scores were calculated by averaging both responses Higher scores indicate more time spent online which increases the possible exposure to motivated offenders
Independent variable 2: Target Suitability (Wave 1)
Risky online usage was used to assess target suitability It was assessed using three questions utilized in previous studies (Erdur-Baker, 2010; Ybarra, Mitchell, Finkelhor, & Wolak, 2007): “Have you ever asked someone you met on the internet to meet face to face?”,
“Have you ever disclosed your personal information to unknown people over the internet, including password and username?” and “Have you ever accepted an invitation to meet in person someone you met over the Internet?” (0 = Never, 1 = 1 time, 2 = 2-4 times, 3 = several times) A summary score was calculated by averaging all responses Higher scores indicate higher target suitability
Independent variable 3: Lack of Capable Guardianship (Wave 1)
Three questions were used to assess the lack of capable guardianship (parental supervision of the Internet use): “Do you have to get your parents’ permission before using the Internet?”, “Do your parents have any rules regarding the amount time you could spend online?”, and “Do your parents have any restriction regarding your online activities?” (0 =
no, 1 = yes) Summary scores were calculated by an average of all responses Lower scores indicate having lower lack of capable guardianship
Dependent variable: Cyber victimization (Wave 2)
Trang 29Cyber victimization was measured with the eight-item General Online
Victimization Subscale (Tynes, Rose, & Williams, 2010; Cronbach’s alpha = 84), answered
on a 6-point Likert-type scale The response options ranged from 0 = never to 5 = every day
A sample item would be: “People have said negative things (like rumors or name calling) about how I look, act, or dress online.” A total score of cyber victimization was created by summing up scores from the eight questions The total score was dichotomized to represent being a cyberbullying victim (the total score is equal to 1 or greater than 1) and non-
cyberbullying victim (the total score is equal to zero)
Control variables: Socio-Demographic variables (Wave 1)
Demographic variables included gender (1 = male, 2 = female) and age
Analysis Plan
Descriptive statistics were conducted to determine the prevalence of cyber
victimization and to provide a description of demographic characteristics (age and gender) Then, a logistic regression analysis was performed to test the hypothesis as to whether exposure to motivated offenders, target suitability, and lack of capable guardianship were significantly related to cyberbullying victimization Control variables (gender and age) were entered in the first step In the next step, all independent variables (exposure to motivated offenders, target suitability, and lack of capable guardianship) were entered in one step to measure how well cyber victimization at Wave 2 could be predicted from the three elements
of routine activity theory measured in Wave 1 after controlling for demographics All descriptive statistics and regression were conducted in IBM SPSS Statistics 22
Trang 30Results
Descriptive statistics are presented in Table 1 The mean age of participants was 11.40 years (SD = 49) The majority of participants were males (58.2%) Almost 25% of students reported cyberbullying victimization (24.6%) To explore whether three
determinants identified in Routine Activity Theory may influence cyberbullying
victimization, Table 2 presents the hierarchical binary logistic regression estimates for cyberbullying victimization The model controlled for the participants’ age and gender The results indicated that two precursors of routine activities theory affected the odds of
cyberbullying victimization First, greater time spent online (exposure to motivated
offenders) in 5th grade increased the odds of cyberbullying victimization in 6th grade (OR =
1.30, 95% CI = 1.01-1.65, p < 05) Specifically, the odds of cyberbullying victimization
increased by 30% by any increase of 1 unit in time spent online Second, greater risky online usage (target suitability) in 5th grade increased the odds of cyberbullying victimization in 6th
grade (OR = 3.37, 95% CI = 1.07-10.61, p < 05) In other words, the odds of cyberbullying
victimization increased by 3.37 times for each one-unit increase in risky online usage However, parental supervision (capable guardianship) in 5th grade did not affect the odds of cyberbullying victimization in 6th grade (OR = 69, 95% CI = 25-1.90, p > 05)
Discussion
The purpose of the present study was to shed light into what factors result in cyberbullying victimization among Taiwanese children To extend our understanding of cyberbullying victimization, I built on routine activity theory to demonstrate whether (a)
Trang 31exposure to motivated offenders (i.e., time spent online), (b) target suitability (i.e., risky online usage), and (c) lack of capable guardianship (i.e., parental supervision of the Internet use) have impacts on cyberbullying victimization Specifically, I predicted that exposure to motivated offenders, target suitability, and lack of capable guardianship were positively related to cyberbullying victimization
The results generally support the hypotheses The key findings in the current study were that time spent online and risky online usage were significant antecedents of
cyberbullying victimization Specifically, children who spent more time online in 5th grade reported higher cyberbullying victimization in 6th grade compared to those who spent less time online Additionally, children who demonstrated higher risky online usage in 5th grade reported higher likelihood of cyberbullying victimization in 6th grade than those who
demonstrate lower risky online usage However, the results showed that parental supervision
of the Internet in 5th grade was not associated with greater likelihood of cyberbullying victimization in 6th grade I discuss theoretical and practical implications of these findings in the proceeding sections
Theoretical and Practical Implications
The results of the current study contribute to the cyberbullying literature by
corroborating and extending previous findings in several ways First, the significant findings
of time spent online and risky online usage as antecedents of cyberbullying victims might extend the integrated cyberbullying model and crime opportunity theory (i.e., routine activity theory) Despite past research that has focused on associations between personal factors (e.g , gender and age), situational factors (e.g., school climate), and cyberbullying
Trang 32victimization, relatively little research has investigated these significant factors by applying a solid theoretical base In a recent meta-analytic research, Kowalski et al (2014) utilized the general aggression model to identify several factors (e.g., traditional victimization, traditional bullying, school safety, and anger) that may result in cyberbullying victimization The
present study applied routine activity theory examining whether there were other antecedents which lead to cyberbullying victimization to advance our understanding of cyberbullying victimization Consistent with this theoretical rationale and prior research, my findings demonstrate that when children spend more time online or engage in more risky online behaviors, their likelihoods of being cyberbullying victims will increase (Chang et al., 2015; Erdur-Baker, 2010) These finding are important because they suggest that increased
exposure to motivated offenders (e.g., the time children spent online) and target suitability (e.g., the display of risky online behaviors) will cause high risks of cyberbullying
victimization Unexpectedly, I obtained non-significant findings regarding parental
supervision of the Internet This is similar to Kowalski et al.’s (2014) findings; they found parent control of technology was not related to cyberbullying victimization One of the possible reasons for this is that parental behaviors (e.g., Internet supervision) may be
underestimated or overestimated by children’s self-report (Liau, Khoo, & Ang, 2008) For example, Lenhart (2005) found that 62% of parents reported supervision of children’s
Internet usage, but only 33% of children believed their parents had checked up on the sites that they had visited Thus, the measure of parental behaviors from children’s perspective may be biased (e.g., social desirability bias) which in turn would influence my results
Trang 33Overall, the current study clarifies what risk factors (i.e., time spent online and risky online usage) have a significant impact on cyberbullying victimization
My findings also have critical practical implications for parents and educators First, although my findings indicate that the more time children spend online, the more exposed they are to being cyberbullying victims, it is not likely to be a reasonable or practical solution to decrease children’ s time spent online because the Internet usage still provides lots
of benefits (e.g., education) for them Therefore, it is important to educate children on ethical, polite, safe, and responsible interactions in an electronic context, particularly how to protect themselves in a cyber-environment Second, my findings suggest that participating in online risk behaviors (e.g., providing passwords or personal information to friends) increases the likelihood of cyberbullying victimization Thus, it is necessary for parents and educators to enhance children’s knowledge and safety skills to reduce their risky usage of the Internet Third, my findings also propose a training intervention targeting parents’ supervision of children’s online usage Specifically, through training, parents can increase related
knowledge, correct children’s risky online behaviors, and educate children on online safety behaviors Overall, it is imperative to implement evidence-based cyberbullying prevention programs that educate students on how to avoid cyberbullying and how to respond to
cyberbullying to decrease the likelihood of cyberbullying
Limitations
I acknowledge some limitations of the present study First, this study uses reported data, and all participants were asked to respond to items based on their perception and experience It might be possible that children may not truly evaluate their own behaviors
Trang 34self-or parents’ behaviself-ors (Liau et al., 2008) Social desirability bias may influence participants’ responses That is, cyberbullying victimization might be underestimated or overestimated in the present study Future studies may employ alternative methods for data collection For example, researchers can recruit parents or teachers to assess children’s cyberbullying
victimization Second, the measures of cyberbullying victimization vary from study to study
As such, variance in the prevalence of cyberbullying victimization may exist when
comparing prevalence rates across studies and countries Finally, generalizing the results from our study might be limited by the sample I examine All the participants were recruited
in Taiwan Taiwan is seen as one representation of collectivism (Ali, Lee, Hsieh, &
Krishnan, 2005), and it may demonstrate different patterns of cyberbullying in a
cross-cultural context Moreover, all participants were 5th grade students in the present study Caution must be taken in generalizing the results to students in the nonparticipating grades
Conclusion
Overall, findings from the current study provide a significant and programmatic contribution to the existing literature on cyberbullying Specifically, the present study is unique in examining the risk factors of cyberbullying victimization among Taiwanese
children My findings indicate that the time children spend online and risky online usage will significantly influence the likelihood of cyberbullying victimization In conclusion, this study provides valuable and useful information to parents and educators planning to implement cyberbullying prevention programs, as well as to researchers interested in identifying what risk factors result in cyberbullying victimization These findings may contribute to the
Trang 35development of effective education interventions in children’s Internet usage to avoid cyberbullying
Trang 36References
Ali, A J., Lee, M., Hsieh, Y C., & Krishnan, K (2005) Individualism and collectivism in
Taiwan Cross Cultural Management: An International Journal, 12(4), 3-16
Biber, J K., Doverspike, D., Baznik, D., Cober, A., & Ritter, B A (2002) Sexual
harassment in online communications: Effects of gender and discourse medium
CyberPsychology & Behavior, 5(1), 33-42
Bossler, A M., & Holt, T J (2009) On-line activities, guardianship, and malware infection:
an examination of routine activities theory International Journal of Cyber
Criminology, 3(1), 400-420
Camodeca, M., Goossens, F A., Schuengel, C., & Terwogt, M M (2003) Links between social information processing in middle childhood and involvement in bullying
Aggressive Behavior, 29(2), 116-127
Cassidy, W., Brown, K., & Jackson, M (2012) 'Making kind cool': Parents’ suggestions for
preventing cyber bullying and fostering cyber kindness Journal of Educational Computing Research, 46(4), 415-436
Chang, F., Chiu, C., Miao, N., Chen, P., Lee, C., Huang, T., & Pan, Y (2015) Online gaming and risks predict cyberbullying perpetration and victimization in adolescents
International Journal of Public Health, 60(2), 257-266
Chang, F., Lee, C., Chiu, C., Hsi, W., Huang, T., & Pan, Y (2013) Relationships among
cyberbullying, school bullying, and mental health in Taiwanese adolescents Journal
of School Health, 83(6), 454-462
Trang 37Chiribuca, D., & Răcătău, I M (2013) Studying children and their internet experiences:
online risks between theoretical approaches and methodological issues Journal of Media Research-Revista de Studii Media, 2(16), 3-14
Chou, C., Condron, L., & Belland, J C (2005) A review of the research on internet
addiction Educational Psychology Review, 17(4), 363-388
Cohen, L E., & Felson, M (1979) Social change and crime rate trends: A routine activity
approach American Sociological Review, 44(4), 588-608
Cook, C R., Williams, K R., Guerra, N G., Kim, T E., & Sadek, S (2010) Predictors of bullying and victimization in childhood and adolescence: A meta-analytic
investigation School Psychology Quarterly, 25(2), 65-83
Crick, N R., & Dodge, K A (1994) A review and reformulation of social
information-processing mechanisms in children's social adjustment Psychological bulletin, 115(1),
74-101
Dempsey, A G., Sulkowski, M L., Nichols, R., & Storch, E A (2009) Differences between peer victimization in cyber and physical settings and associated psychosocial
adjustment in early adolescence Psychology in the Schools, 46(10), 962-972
Dilmaç, B., & Aydoğan, D (2010) Parental attitudes as a predictor of cyber bullying among
primary school children International Journal of Psychological and Brain Sciences, 5(10), 649-653
Dooley, J J., Pyżalski, J., & Cross, D (2009) Cyberbullying versus face-to-face bullying
Zeitschrift für Psychologie/Journal of Psychology, 217(4), 182-188
Trang 38Erdur-Baker, Ö (2010) Cyberbullying and its correlation to traditional bullying, gender and
frequent and risky usage of internet-mediated communication tools New Media & Society, 12(1), 109-125
Gini, G., & Pozzoli, T (2009) Association between bullying and psychosomatic problems:
A meta-analysis Pediatrics, 123(3), 1059-1065
Gullone, E., & Robertson, N (2008) The relationship between bullying and animal abuse
behaviors in adolescents: The importance of witnessing animal abuse Journal of
Applied Developmental Psychology, 29(5), 371-379
Hemphill, S A., Kotevski, A., Tollit, M., Smith, R., Herrenkohl, T I., Toumbourou, J W., & Catalano, R F (2012) Longitudinal predictors of cyber and traditional bullying
perpetration in Australian secondary school students Journal of Adolescent Health, 51(1), 59-65
Henry, B., Caspi, A., Moffitt, T E., Harrington, H., & Silva, P A (1999) Staying in school protects boys with poor self-regulation in childhood from later crime: A longitudinal
study International Journal of Behavioral Development, 23(4), 1049-1073
Hinduja, S., & Patchin, J W (2008) Cyberbullying: An exploratory analysis of factors
related to offending and victimization Deviant behavior, 29(2), 129-156
Holt, T J., Fitzgerald, S., Bossler, A M., Chee, G., & Ng, E (2014) Assessing the Risk Factors of Cyber and Mobile Phone Bullying Victimization in a Nationally
Representative Sample of Singapore Youth International Journal of Offender Therapy and Comparative Criminology, 60(5), 598-615
Trang 39Juvonen, J., & Gross, E F (2008) Extending the school grounds?—Bullying experiences in
cyberspace The Journal of School Health, 78(9), 496–505
Katzer, C., Fetchenhauer, D., & Belschak, F (2009) Cyberbullying: Who are the victims? A
comparison of victimization in internet chatrooms and victimization in school Journal
of Media Psychology: Theories, Methods, and Applications, 21(1), 25
Kowalski, R M., Giumetti, G W., Schroeder, A N., & Lattanner, M R (2014) Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among
youth Psychological Bulletin, 140(4), 1073-1137
Kowalski, R M., Limber, S P., & Agatston, P W (2008) Cyberbullying Malden, MA:
Blackwell
Li, Q (2006) Cyberbullying in schools: A research of gender differences School Psychology International, 27(2), 157–170
Li, Q (2007) Bullying in the new playground: Research into cyberbullying and cyber
victimisation Australasian Journal of Educational Technology, 23(4), 435-454
Liau, A K., Khoo, A., & Ang, P H (2008) Parental awareness and monitoring of adolescent
Internet use Current Psychology, 27(4), 217-233
Marcum, C D., Higgins, G E., & Ricketts, M L (2010) Potential factors of online
victimization of youth: An examination of adolescent online behaviors utilizing
routine activity theory Deviant Behavior, 31(5), 381-410
Mason, K L (2008) Cyberbullying: A preliminary assessment for school personnel
Psychology in the Schools, 45(4), 323-348
Trang 40Merrell, K W., Gueldner, B A., Ross, S W., & Isava, D M (2008) How effective are school bullying intervention programs? A meta-analysis of intervention research
School Psychology Quarterly, 23(1), 26
Mesch, G S (2009) Parental mediation, online activities, and cyberbullying
Cyberpsychology & Behavior, 12(4), 387-393
Olweus, D (1993) Bullying at School: What We Know and What We Can Do Cambridge,
MA: Blackwell
Reijntjes, A., Kamphuis, J H., Prinzie, P., & Telch, M J (2010) Peer victimization and
internalizing problems in children: A meta-analysis of longitudinal studies Child Abuse & Neglect, 34(4), 244-252
Sourander, A., Klomek, A B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., & Helenius, H (2010) Psychosocial risk factors associated with cyberbullying among
adolescents: A population-based study Archives of general psychiatry, 67(7),
720-728
Spears, B., Slee, P., Owens, L., & Johnson, B (2009) Behind the scenes and screens:
Insights into the human dimension of covert and cyberbullying Zeitschrift für
Psychologie/Journal of Psychology, 217(4), 189
Toblin, R L., Schwartz, D., Gorman, A H., & Abou-ezzeddine, T (2005) Social–cognitive
and behavioral attributes of aggressive victims of bullying Journal of Applied
Developmental Psychology, 26(3), 329-346