Next Article in Journal
Population-Based Linkage of Big Data in Dental Research
Previous Article in Journal
Spatial and Temporal Distribution of Particulate Phosphorus and Their Correlation with Environmental Factors in a Shallow Eutrophic Chinese Lake (Lake Taihu)
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Investigating the Comparability of Two Multi-Item-Scales for Cyber Bullying Measurement

Centre for Educational Research, University Koblenz-Landau, 76829 Landau, Germany
Int. J. Environ. Res. Public Health 2018, 15(11), 2356; https://doi.org/10.3390/ijerph15112356
Submission received: 29 September 2018 / Revised: 17 October 2018 / Accepted: 24 October 2018 / Published: 25 October 2018
(This article belongs to the Section Health Behavior, Chronic Disease and Health Promotion)

Abstract

:
In current cyberbullying literature, researchers assess the phenomenon using a large variety of measurement approaches. This poses a problem in light of comparability of study results. The most common approaches are singular global questions or multi-item scales that list several forms of cyberbullying. Such lists contain either different types of actions or different types of media. This study explores different measurement approaches. Two multi-item scales, one listing different actions and one listing different media, are compared to investigate whether they measure the same latent construct. Confirmatory factor analysis is used to model one factor for each of the multi-item scales. In the first study, the items cover victimization experiences while in the second study they cover estimation of severity. Results show that the two different multi-item scales measure the same latent construct. These results have a substantial impact on the future of cyberbullying research with regard to study comparability.

1. Introduction

Cyberbullying is a relatively new phenomenon of aggressive behavior among children and adolescents. Although it has received much attention by the media and the scientific community, many authors criticize that studies on cyberbullying are not based on scientific theories and are all published under the keyword “cyberbullying” in spite of different assessment strategies [1,2]. The assessment of cyberbullying poses many methodological problems (see below). Variations in definitions, operationalizations, and data analysis lead to the problem that results of different studies are hardly comparable.
This special issue focuses on prevention and intervention programs for cyberbullying. Tackling cyberbullying is a very important task since the experience of being bullied online can lead to severe impairments in health and well-being, e.g., psychosomatic problems, anxiety and depression, low self-esteem, and substance abuse [3,4,5]. To evaluate the success of intervention programs, we need reliable and valid measures of the phenomenon. Since different evaluation studies use different operationalizations and measures, we need scientific evidence that different measurement approaches measure the same construct. Thus, measurement is the basis for finding evidence on successful interventions. This paper aims to compare different approaches to ensure valid measurement.
Despite other definitions [2], this paper follows the most common definition by Smith et al. (2008) who understand cyberbullying as “an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him- or herself” [6] (p. 376). Following this definition, studies that ignore the criterion of repetition do not investigate cyberbullying but online (cyber) aggression. “Cyber-aggression refers to any behavior enacted through the use of information and communication technologies that is intended to harm another person(s) that the target person(s) wants to avoid” [7] (p. 305). Therefore, cyberbullying is a subset of online aggression that seems to happen less often.
Beside variations in the defining criteria, which result in different operationalizations, questionnaires vary in other aspects that have been proven to lead to different prevalence rates [8]. In addition to the effect on prevalence rates, those differences in operationalization also lead to diverging correlations with other variables, such as age, gender, and personality [9]. Corcoran and colleagues [10] go as far as stating that different studies on cyberbullying do not even measure the same construct due to differences in operationalization. Those differences concern the following aspects:
  • Time frame: The length of the period that subjects are asked to consider has an effect on prevalence. Time frames vary from asking about incidents within the last two months to “ever” [8].
  • Cut-off values/frequency: This criterion defines how many attacks a person must experience in order to be considered a victim of cyberbullying. A commonly used criterion is being subject to peer aggression online at least once a week [6]. However, some authors ignore the definition element of repetition and already diagnose cyberbullying when someone has been attacked only once, which is not cyberbullying but online aggression [11]. Mixing up these two phenomena is a big problem in cyberbullying research and leads to artificial effects on prevalence rates of between 4% and 72%, depending on the study [12].
  • Choice of wording: Prevalence rates drop when the word “bullying” is explicitly used in an item [13]. This is probably a result of people trying to avoid labeling themselves as a victim [14].
  • Measurement strategy: Cyberbullying can be measured directly by asking a singular global question (e.g., “Are you being bullied?”) or by presenting a list of items for different forms of cyberbullying (multi-item scales) [1]. Studies have shown that the two approaches do not lead to the same number of persons identified as bullies or victims, even though correlations between both approaches are high [15,16,17].
For any aspect mentioned above, there is no “right” or “wrong” way of measuring—the adequate strategy depends on the research question. Global questions give information about the subjective perception of a person as a victim, whereas behavior-based multi-item scales try to find out the exact number of incidents.
This paper focuses on multi-item scales and how they relate to each other. A broad variety of multi-item scales can be found in cyberbullying literature [18]. A review of 61 studies found 44 different measurement approaches [19]. Very few studies report data about the reliability or validity of the used instruments so that the quality of measurement cannot be determined [20].
Usually, multi-item scales are based on a specific classification of cyberbullying forms where each form is measured by at least one item. The most commonly used classification approaches in current studies list either different types of actions [21,22] or different types of media [23,24,25]. Taxonomies of media (TOM) distinguish virtual attacks by different types of communication: text messages, e-mails, calls, chats, instant messages, and websites [6]. Taxonomies of actions (TOA) list several types of aggressive behavior in virtual contexts. The taxonomy by Willard (2007) [26] contains the following four forms, which are consistent with the definition of cyberbullying: Harassment is the direct sending of hurtful, offensive, or threatening messages from bully to victim whereas denigration stands for the public humiliation of victims by posting offensive, ridiculing, or other derogatory material. Spreading private messages or pictures/videos that were not meant for the public, against the will of the victim, is called outing/trickery. Exclusion means leaving the victim out of group activities, such as chats, online games, forums, etc.
Taxonomies of actions and taxonomies of media both claim to measure cyberbullying. Studies usually choose one of the two approaches, but none use both multi-item scales. This makes it impossible to compare the results of different studies. Assuming that both courses of action measure the same phenomenon, all studies are listed under the keyword “cyberbullying”. However, this assumption has not been subject to any empirical investigation yet, although there is a strong need to find proof for it [10]. The aim of this study is to find out how multi-item scales based on taxonomies of media and based on taxonomies of actions relate to each other and whether they measure the same latent construct.

2. Materials and Methods

In two different empirical studies, teachers in training provided information about bullying and cyberbullying. They informed the students about the definitions of bullying and cyberbullying and about the consequences of victimization, thus pointing out the importance of tackling the problem. After the information session, which was not an intervention, students anonymously filled in questionnaires. As almost all students were under age, the parents received an information form about content and purpose of the study in advance. Their consent was required for the students to participate. If required, the results were communicated to the school administrators in order to get an idea of the extent of cyberbullying problems in their school.
Students from five secondary schools in Germany took part in the first study. n = 578 participants filled in the questionnaire. Of these students, 54% were male and 44% were female (2% did not answer the item). The age ranged from 11 to 18 years (M = 14.71 years, SD = 1.32). n = 488 students from three German secondary schools took part in the second study. Of these students, 60.9% were male and 44% were female (one person did not answer the item). The age ranged from 12 to 17 years (M = 14.86 years, SD = 1.12).
In study 1, the participants filled in a questionnaire that among others contained a global question and two multi-item scales to measure the frequency of experiences with cyberbullying. The scale for the TOA taxonomy contained one item each for harassment (“How often did it occur during the last year that someone sent you threatening, insulting, or other discomforting messages on the internet or on your cell phone?”), denigration (“(...) that someone spread rumors or insults about you throughout the internet or on other peoples’ cell phones?”), outing and trickery (“(...) that someone passed on private e-mails, chat messages, or pictures of you, in order to expose you?”), and exclusion (“(...) that your classmates excluded you from chats or online games?”). The answer format was a five-point Likert scale ranging from “never” to “several times a week.” The scale for the TOM taxonomy used the same answering format and contained items for the following six types of communication: text messages, e-mails, calls, chats, instant messages, and websites (“How often did it occur during the last year that you were attacked, insulted, threatened, exposed, or excluded via the following media…)”.
To answer the research question, a confirmatory factor analysis in Mplus (version 6.1, Muthen & Muthen, Los Angeles, CA, USA) was used to model the latent constructs that the TOA and the TOM are measuring. Models were estimated with the WLSMV algorithm [27] to account for skewed data distributions.
Correlation-based methods such as factor analysis might be susceptible to methodological artifacts. One of the problems with aggression data is low incidence, leading to zero-inflated data, i.e., the majority of people have had no victimization experiences at all, which results in skewed distributions. Another problem is a high poly-victimization across several forms of aggression [28]. Poly-victimization means that people who are victims of one type of aggressive behavior (e.g., violence in schools) also experience other types, such as family violence. A high correlation between two types of aggressive behavior, therefore, cannot prove whether they are both part of the same construct. High correlations between TOA and TOM factors could be due to the fact that many participants hardly experience any victimization at all and those who do, experience different forms of victimization at the same time. To rule out such artifacts, the findings need validation with a second approach.
In study 2, participants also answered questions about several forms of cyberbullying that were listed in one multi-item scale for types of actions and one for types of media. However, the items did not relate to the frequency of experiences but to the severity. Thus, students were asked how “bad” they considered it when someone, e.g., gets a threatening or offensive message (harassment). The answer format was a four-point Likert scale ranging from “not bad at all” to “very bad.” Not only victims of cyberbullying but all students were able to estimate the severity of various bullying forms by putting themselves in the victim’s place, which result in more equally distributed data.
Earlier studies showed that the severity assessment of different cyberbullying forms depend on whether aggressive actions were carried out only by texts or by picture/video material [29]. To consider these differences, harassment, denigration, and outing/trickery were each operationalized by two items, one for text- and one for picture-based virtual attacks.
Confirmatory factor analysis with one TOA and one TOM factor was conducted with Mplus (version 6.1) and the Maximum Likelihood estimator.
To test whether TOA and TOM multi-item scales measure the same latent construct, latent factor correlations were computed for both studies. They can be considered measures of the same latent construct when the latent correlation is very high.

3. Results

In Section 3.1 and Section 3.2, the results of study 1 and study 2 are presented.

3.1. Study 1

The distribution of answers for victimization experiences with different forms of cyberbullying is skewed with a high inflation of zero experiences (see Table 1).
Since the item “mail” had a variance close to zero (only 4 of the 558 students ticked off the answer “once or twice”), it was excluded from further analyses. Figure 1 shows the model, factor loadings, and factor correlations of the confirmatory factor analysis with two separate factors (model 1.1).
All factor loadings are significant (p < 0.001) and show a large connection to the factors (0.612 < λ < 0.921). The latent correlation between TOA and TOM is so high that it is evidently not different from a perfect correlation. This can be tested by comparing the specified model to a second model (model 1.2) that consists of only one factor; see Table 2. Mathematically, this is equal to fixing the correlation at 1. A chi² difference test shows no significant difference in model fit. The chi² difference test for nested models investigates whether model fit decreases significantly when parameters are fixed that were free in a H0 model. Since a direct comparison with the baseline model is not available for WLSMV, this was done with the DIFFTEST function in Mplus. The measures for global fit show that the models do not significantly differ from each other and fit the data well (Table 2). The two factors for TOA and TOM measure the same latent construct.

3.2. Study 2

Table 3 shows the descriptive statistics and the distribution of answers for the estimated severity of different forms of cyberbullying. Picture-based forms are in each case considered more severe than the respective text-based forms. The items in the TOA multi-item scale show a wider range in severity than the TOM items.
Model 2.1 replicates the two-factor model in study 1. Since text- and picture-based forms of each type of action share more variance than they do with other forms of cyberbullying, additional correlations are specified. Figure 2 shows the model and its estimation results.
All factor loadings in model 2.1 are significant (p < 0.001) and show a substantial connection to the factors (0.246 < λ < 0.894), although the factor loadings are lower than in study 1. The latent correlation between the two factors is very high but as a chi² difference test with a one-factor model shows, the correlation is significantly different from one (see Table 4). As a result, factor loadings on a common factor are still significant but somewhat lower (0.217 < λ < 0.889) and the model fit is better in a two-factor model.
For both models, model fit is acceptable. Evidently, the very high factor correlation still speaks for a common underlying construct.

4. Discussion

The frequency of victimization approach in study 1 and the severity approach in study 2 complement each other and give insight in two different perspectives of cyberbullying measurement with multi-item scales.
The results indicate that TOA and TOM measures are both indicators of the same latent construct. As expected, data from the severity approach, which are not susceptible to artifacts due to poly-victimization and zero-inflated data, show somewhat lower factor loadings and correlations than data on the frequency of experience. However, the second study supports the assumption of a common construct behind both measurement approaches.
This finding is very important for the future of cyberbullying research. Like many authors have complained [2,10], different studies on cyber aggression and cyberbullying are hardly comparable because of the different definitions, operationalization, etc. that they use. The results of this study show, however, that studies with multi-item scales by TOA or by TOM can be compared in spite of their different operationalization.
For correlation studies with other constructs, as well as for the evaluation of prevention and intervention programs, researchers have to decide on an adequate measurement strategy. Using TOA as well as TOM multi-item scales is the best approach because more items lead to a more reliable and, therefore, a more valid measurement. Due to economic reasons, it might become necessary to restrict oneself to the use of only one of the two multi-item scales. Although TOA taxonomies give a more detailed picture of what exactly the cyberbullying incidents look like, TOM scales are probably the better choice for intervention studies because they show which media represent the highest risks. TOA scales should differentiate between text- and picture-based forms of attacks. When the researcher is less interested in the number of attacks and more in the subjective perception of the victims, singular global measures can complement multi-item scales with an inside perspective.
There are also a few limitations to consider. While this paper shows that results of different studies can be compared when they use either the taxonomy of actions [6] or the taxonomy of media [26], some studies on cyberbullying use neither of the two measures. For such different approaches, the proof of equivalence is still needed. The procedure described in this paper can be a blueprint for testing the equivalence of other measurement approaches. In addition, since the data were collected from ad-hoc samples, the results should be replicated with larger and representative samples.

5. Conclusions

“Cyberbullying research has addressed substantive problems and between-construct issues before within-construct issues such as definition, structure, and measurement have been resolved” [30] (p. 68). This paper dealt with an important within-construct issue, the measurement of cyberbullying. As the results show, data from existing studies can be compared even though they use different approaches to assess cyberbullying. At the same time, the same procedure can be applied to other operationalizations of cyberbullying, thus finding out whether even more measurement approaches lead to comparable results. The fact that the issue of measurement is often ignored in cyberbullying literature is problematic since measurement is the basis for assessing the success of prevention and intervention. Without reliable and valid measurement, however, it is impossible to identify best-practice intervention programs.
This article focuses on measurement, but important information was also gained about another unresolved issue on the concept of cyberbullying, concerning its structure [19,30]. It seems that in spite of different types of actions and types of media, which are used to cyberbully others, the construct is heterogeneous yet unidimensional.
Early interventions to tackle cyberbullying are becoming more and more important because of the consequences of cyberbullying experiences. Lately, adults—even in visible political and celebrity positions—have been setting a bad example by openly engaging in behaviors of online social cruelty. This can lead to an acceptance of such misbehaviors among adolescents and makes effective interventions difficult, but all the more important.
However, although the internet seems to be a dangerous place for children and adolescents where they are at risk of experiencing bullying, sexual harassment or witnessing excessive violence [31], the web and information and communication technologies can also be used as tools for intervention [32]. As the research field of homophobic and transphobic bullying shows, for example, risks of anonymous online harassment are balanced by the benefits of online connections and online activism for marginalized youth [33].

Funding

This research received no external funding.

Acknowledgments

The author thanks Gabriele Dlugosch, Christian Marquardt, and Marina Schmidt for useful comments on this paper.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Menesini, E.; Nocentini, A.; Calussi, P. The Measurement of Cyberbullying: Dimensional Structure and Relative Item Severity and Discrimination. Cyberpsychol. Behav. Soc. Netw. 2011, 14, 267–274. [Google Scholar] [CrossRef] [PubMed]
  2. Tokunaga, R.S. Following you home from school: A critical review and synthesis of research on cyber bullying victimization. Comput. Hum. Behav. 2010, 26, 277–287. [Google Scholar] [CrossRef]
  3. Serafini, G.; Pompili, M.; Borgwardt, S.; Houenou, J.; Geoffroy, P.A.; Jardri, R.; Girardi, P.; Amore, M. Brain changes in early-onset bipolar and unipolar depressive disorders: A systematic review in children and adolescents. Eur. Child Adolesc. Psychiatry 2014, 23, 1023–1041. [Google Scholar] [CrossRef] [PubMed]
  4. Kiriakidis, S.P.; Kavoura, A. Cyberbullying: A review of the literature on harassment through the internet and other electronic means. Fam. Community Health 2010, 33, 82–93. [Google Scholar] [CrossRef] [PubMed]
  5. Perren, S.; Dooley, J.; Shaw, T.; Cross, D. Bully/victim problems in schools and in cyberspace: Associations with depressive symptoms in Swiss and Australian adolescents. Child Adolesc. Psychiatry Ment. Health 2010, 4, 28. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Smith, P.K.; Mahdavi, J.; Carvalho, M.; Fisher, S.; Russell, S.; Tippett, N. Cyberbullying: Its nature and impact in secondary school pupils. J. Child Psychol. Psychiatry 2008, 49, 376–385. [Google Scholar] [CrossRef] [PubMed]
  7. Pyżalski, J. From cyber bullying to electronic aggression: Typology of the phenomenon. Emot. Behav. Diffic. 2012, 17, 305–317. [Google Scholar] [CrossRef]
  8. Savage, M. Developing a Measure of Cyber bullying Perpetration and Victimization. Ph.D. Dissertation, Arizona State University, Tempe, AZ, USA, 2008. [Google Scholar]
  9. Dooley, J.J.; Pyżalski, J.; Cross, D. Cyber bullying Versus Face-to-Face Bullying. Zeitschrift für Psychologie/J. Psychol. 2009, 217, 182–188. [Google Scholar] [CrossRef]
  10. Corcoran, L.; McGuckin, C.; Prentice, G. Cyber bullying or cyber aggression? A review of existing definitions of cyber-based peer-to-peer aggression. Societies 2015, 5, 245–255. [Google Scholar] [CrossRef]
  11. Bauman, S.; Underwood, M.K.; Card, N. Definitions: Another perspective and a proposal for beginning with cyberaggression. In Principles of Cyber Bullying Research; Bauman, S., Cross, D., Walker, J.L., Eds.; Routledge: New York, NY, USA, 2012; pp. 41–46. ISBN 978-0415897495. [Google Scholar]
  12. Ybarra, M.L. Measurement: Why it matters. In Principles of Cyber Bullying Research; Bauman, S., Cross, D., Walker, J.L., Eds.; Routledge: New York, NY, USA, 2012; pp. 183–187. ISBN 978-0415897495. [Google Scholar]
  13. Kert, A.; Codding, R.S.; Tryton, G.S.; Shiyko, M. Impact of the term “bully” on the reported rate of bullying behavior. Psychol. Sch. 2010, 47, 193–204. [Google Scholar]
  14. Menesini, E.; Nocentini, A. Cyber bullying Definition and Measurement. Zeitschrift für Psychologie/J. Psychol. 2009, 217, 230–232. [Google Scholar] [CrossRef]
  15. Menesini, E.; Modena, M.; Tani, F. Bullying and victimization in adolescence. Concurrent and stable roles and psychological health symptoms. J. Genet. Psychol. 2009, 2, 115–134. [Google Scholar] [CrossRef] [PubMed]
  16. Menesini, E.; Nocentini, A.; Fonzi, A. Analisi longitudinale e differenze di genere nei comportamenti aggressivi in adolescenza. Età Evolutiva 2007, 87, 78–85. [Google Scholar]
  17. Vandebosch, H.; van Cleemput, K. Cyber bullying among youngsters: Profiles of bullies and victims. New Media Soc. 2010, 11, 1349–1371. [Google Scholar] [CrossRef]
  18. Nocentini, A.; Calmaestra, J.; Schultze-Krumbholz, A.; Scheithauer, H.; Ortega, R.; Menesini, E. Cyberbullying: Labels, behaviors and definition in three European countries. Aust. J. Guid. Couns. 2010, 20, 129–142. [Google Scholar] [CrossRef]
  19. Berne, S.; Frisén, A.; Schultze-Krumbholz, A.; Scheithauer, H.; Naruskov, K.; Luik, P. Cyberbullying assessment instruments: A systematic review. Aggress. Violent Behav. 2013, 18, 320–334. [Google Scholar] [CrossRef] [Green Version]
  20. Alvarez-García, D.; Núnez, J.C.; Barreiro-Collazo, A.; García, T. Validation of the Cybervictimization Questionnaire (CYVIC) for adolescents. Comput. Hum. Behav. 2017, 70, 270–281. [Google Scholar] [CrossRef]
  21. Ang, R.P.; Goh, D.H. Cyberbullying Among Adolescents: The Role of Affective and Cognitive Empathy, and Gender. Child Psychiatry Hum. Dev. 2010, 41, 387–397. [Google Scholar] [CrossRef] [PubMed]
  22. Erdur-Baker, O. Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools. New Media Soc. 2010, 12, 109–125. [Google Scholar] [CrossRef]
  23. Beran, T.; Li, Q. Cyber-Harassment: A new method for an old behavior. J. Educ. Comput. Res. 2005, 32, 265–277. [Google Scholar]
  24. Ortega, R.; Elipe, P.; Mora-Merchán, J.A.; Calmaestra, J.; Vega, E. The Emotional Impact on Victims of Traditional Bullying and Cyberbullying. Zeitschrift für Psychologie/J. Psychol. 2009, 217, 197–204. [Google Scholar] [CrossRef]
  25. Slonje, R.; Smith, P.K. Cyberbullying: Another main type of bullying? Scand. J. Psychol. 2008, 49, 147–154. [Google Scholar] [CrossRef] [PubMed]
  26. Willard, N.E. Cyber Bullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress; Research Press: Champaign, IL, USA, 2007; ISBN 978-0878225378. [Google Scholar]
  27. Beauducel, A.; Herzberg, P.Y. On the Performance of Maximum Likelihood Versus Means and Variance Adjusted Weighted Least Squares Estimation in CFA. Struct. Equ. Model. 2006, 13, 186–203. [Google Scholar] [CrossRef]
  28. Finkelhor, D. Childhood Victimization: Violence, Crime and Abuse in the Lives of Young People; Oxford University Press: New York, NY, USA, 2008; ISBN 978-0195342857. [Google Scholar]
  29. Pieschl, S.; Kuhlmann, C.; Porsch, T. Beware of Publicity! Perceived Distress of Negative Cyber Incidents and Implications for Defining Cyberbullying. J. Sch. Violence 2014, 14, 111–132. [Google Scholar] [CrossRef]
  30. Craven, R.G.; Marsh, H.W.; Parada, R.H. Potent ways forward: New multidimensional theoretical structural models of cyberbullying, cyber targetization and bystander behaviors and their potential relations to traditional bullying constructs. In Principles of Cyber Bullying Research; Bauman, S., Cross, D., Walker, J.L., Eds.; Routledge: New York, NY, USA, 2012; pp. 68–86. ISBN 978-0415897495. [Google Scholar]
  31. Teimouri, M.; Hassan, M.S.; Griffiths, M.; Benrazavi, S.R.; Bolong, J.; Daud, A. Assessing the validity of western measurement of online risks to children in an Asian context. Child Indic. Res. 2015, 9, 407–428. [Google Scholar] [CrossRef]
  32. Ortega-Ruiz, R.; Rey, R.D.; Casas, J.A. Knowing, building and living together on internet and social networks: The ConRed cyberbullying prevention program. Int. J. Confl. Violence 2012, 6, 302–312. [Google Scholar]
  33. Jones, T.; Smith, E.; Ward, R.; Dixon, J.; Hillier, L.; Mitchell, A. School experiences of transgender and gender diverse students in Australia. Sex Educ. 2016, 16, 156–171. [Google Scholar] [CrossRef]
Figure 1. Model 1.1.
Figure 1. Model 1.1.
Ijerph 15 02356 g001
Figure 2. Model 2.1.
Figure 2. Model 2.1.
Ijerph 15 02356 g002
Table 1. Descriptive statistics and distributions for both multi-item-scales in study 1.
Table 1. Descriptive statistics and distributions for both multi-item-scales in study 1.
ItemMSDNumber of Answers per Category 1
(1)(2)(3)(4)(5)
Type of action
A1Harassment1.340.7014171091776
A2Denigration1.340.7444239922310
A3Out/Trick1.110.41750739341
A4Exclusion1.100.44151827523
Type of medium
M1Text1.190.49547374822
M2Mail1.010.0845544
M3Call1.140.53050736635
M4Chat1.220.591458711244
M5IM1.100.4455173143
M6Web1.330.737426991498
1 Answers range from (1) = “no experiences at all” to (5) = “several times a week”.
Table 2. Model fit and model comparison for two- (1.1) and one-factor (1.2) models in study 1.
Table 2. Model fit and model comparison for two- (1.1) and one-factor (1.2) models in study 1.
Fit IndexModel 1.1Model 1.2
chi² (df), p75.538 (26), p < 0.0000175.512 (27), p < 0.00001
RMSEA (c. i.)0.0600.058
CFI0.9880.988
TLI0.9830.984
chi² difference test1.001 (1), p = 0.3171
Table 3. Descriptive statistics and distributions for both multi-item scales in study 2.
Table 3. Descriptive statistics and distributions for both multi-item scales in study 2.
ItemMSDNumber of Answers per Category 1
(1)(2)(3)(4)
Type of action
A1THarassment text2.670.8093216520971
A1BHarassment picture3.200.7531358227180
A2TDenigration text3.370.7721250163253
A2BDenigration picture3.590.727123295337
A3TOuting/Trickery text3.440.737750149273
A3BOuting/Trickery picture3.720.60262076374
A4Exclusion2.190.89211818314134
Type of medium
M1Text2.650.8093715821764
M2E-Mail2.520.8806714920157
M3Phone call3.020.9093879198163
M4Chat2.650.8544415220475
M5Instant Messenger2.680.8704614120581
M6Website2.970.83520113205140
1 Answers range from (1) = “not bad at all” to (4) = “very bad”.
Table 4. Model fit and model comparison for two- (2.1) and one-factor (2.2) models in study 2.
Table 4. Model fit and model comparison for two- (2.1) and one-factor (2.2) models in study 2.
Fit IndexModel 2.1Model 2.2
chi² (df), p185.286 (61), p < 0.00001197.547 (62), p < 0.00001
RMSEA (c. i.)0.0670.069
CFI0.9500.945
TLI0.9360.931
chi² difference test12.261 (1), p = 0.0005

Share and Cite

MDPI and ACS Style

Fluck, J. Investigating the Comparability of Two Multi-Item-Scales for Cyber Bullying Measurement. Int. J. Environ. Res. Public Health 2018, 15, 2356. https://doi.org/10.3390/ijerph15112356

AMA Style

Fluck J. Investigating the Comparability of Two Multi-Item-Scales for Cyber Bullying Measurement. International Journal of Environmental Research and Public Health. 2018; 15(11):2356. https://doi.org/10.3390/ijerph15112356

Chicago/Turabian Style

Fluck, Julia. 2018. "Investigating the Comparability of Two Multi-Item-Scales for Cyber Bullying Measurement" International Journal of Environmental Research and Public Health 15, no. 11: 2356. https://doi.org/10.3390/ijerph15112356

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop