Asegúrate: An Intervention Program against Cyberbullying Based on Teachers’ Commitment and on Design of Its Instructional Materials
Abstract
:1. Introduction
The Teacher’s Manual: A Key Component of the Asegúrate Program
2. Materials and Methods
2.1. Participants
2.2. Questionnaire
2.3. Process
2.4. Analysis of Results
3. Results
4. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Oberle, E.; Domitrovich, C.E.; Meyers, D.C.; Weissberg, R.P. Establishing systemic social and emotional learning approaches in schools: A framework for schoolwide implementation. Camb. J. Educ. 2016, 46, 277–297. [Google Scholar] [CrossRef]
- Olweus, D. Aggression in the Schools: Bullies and Whipping Boys; Hemisphere Publishing Corporation: Washington, DC, USA, 1978; ISBN 0470993618. [Google Scholar]
- Solberg, M.E.; Olweus, D.; Endresen, I.M. Bullies and victims at school: Are they the same pupils? Br. J. Educ. Psychol. 2007, 77, 441–464. [Google Scholar] [CrossRef] [PubMed]
- Van Ryzin, M.J.; Roseth, C.J. Cooperative learning in Middle School: A means to improve peer relations and reduce victimization, bullying, and related outcomes. J. Educ. Psychol. 2018, 110, 1192–1201. [Google Scholar] [CrossRef]
- Menesini, E.; Salmivalli, C. Bullying in schools: The state of knowledge and effective interventions. Psychol. Health Med. 2017, 22, 240–253. [Google Scholar] [CrossRef] [PubMed]
- Nocito Muñoz, G. Investigaciones sobre el acoso escolar en España: Implicacines psicoeducativas//Research on bullying in Spain: Psicho-educational implications. Revista Española de Orientación y Psicopedagogía 2017, 28, 104–118. [Google Scholar] [CrossRef]
- Garmendia, M.; Jiménez, E.; Casado, M.A.; Mascheroni, G. Net Children Go Mobile: Riesgos y Oportunidades en Internet y el Uso de Dispositivos Móviles Entre Menores Españoles (2010–2015); Red.es/Universidad del País Vasco/Euskal Herriko Unibertsitatea: Madrid, Spain, 2016. [Google Scholar]
- Ertmer, P.A.; Ottenbreit-Leftwich, A.T. Teacher technology change: How knowledge, confidence, beliefs, and culture intersect. J. Res. Technol. Educ. 2010, 42, 255–284. [Google Scholar] [CrossRef]
- Kowalski, R.M.; Giumetti, G.W.; Schroeder, A.N.; Lattanner, M.R. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychol. Bull. 2014, 140, 1073–1137. [Google Scholar] [CrossRef]
- Tokunaga, R.S. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Comput. Hum. Behav. 2010, 26, 277–287. [Google Scholar] [CrossRef]
- Baldry, A.C.; Blaya, C.; Farrington, D.P. International Perspectives on Cyberbullying: Prevalence, Risk Factors and Interventions; Palgrave MacMillan: London, UK, 2018; ISBN 9783319732626. [Google Scholar]
- Slonje, R.; Smith, P.K. Cyberbullying: Another main type of bullying? Scand. J. Psychol. 2008, 49, 147–154. [Google Scholar] [CrossRef]
- Betts, L.R. Cyberbullying: Approaches, Consequences and Interventions; Palgrave Macmillan: Nottingham, UK, 2016; ISBN 9781137500090. [Google Scholar]
- Willard, N. Flame retardant: Cyberbullies torment their victims 24/7: Here’s how to stop the abuse. Sch. Libr. J. 2006, 52, 54. [Google Scholar]
- Ovejero, A.; Smith, P.K.; Yubero, S. El Acoso Escolar y su Prevención: Perspectivas Internacionales; Biblioteca Nueva: Madrid, Spain, 2013; ISBN 8499405800. [Google Scholar]
- Slonje, R.; Smith, P.K.; Frisén, A. The nature of cyberbullying, and strategies for prevention. Comput. Hum. Behav. 2013, 29, 26–32. [Google Scholar] [CrossRef]
- Vandebosch, H.; Van Cleemput, K. Defining Cyberbullying: A Qualitative Research into the Perceptions of Youngsters. CyberPsychol. Behav. 2008, 11, 499–503. [Google Scholar] [CrossRef] [PubMed]
- Curtichs, J.; Fuentes, M.A.; García, Y.; Toca, A. Sentido Social: La Comunicación y el Sentido Común en la Era de la Internet; Profit: Barcelona, España, 2011; ISBN 8492956275. [Google Scholar]
- Athanasiou, K.; Melegkovits, E.; Andrie, E.K.; Magoulas, C.; Tzavara, C.K.; Richardson, C.; Greydanus, D.; Tsolia, M.; Tsitsika, A.K. Cross-national aspects of cyberbullying victimization among 14–17-year-old adolescents across seven European countries. BMC Public Health 2018, 18, 800. [Google Scholar] [CrossRef] [PubMed]
- Zych, I.; Ortega-Ruiz, R.; Del Rey, R. Scientific research on bullying and cyberbullying: Where have we been and where are we going. Aggress. Violent Behav. 2015, 24, 188–198. [Google Scholar] [CrossRef]
- Modecki, K.L.; Minchin, J.; Harbaugh, A.G.; Guerra, N.G.; Runions, K.C. Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional bullying. J. Adolesc. Health 2014, 55, 602–611. [Google Scholar] [CrossRef]
- Ybarra, M.L.; Boyd, D.; Korchmaros, J.D.; Oppenheim, J. (Koby) Defining and measuring cyberbullying within the larger context of bullying victimization. J. Adolesc. Health 2012, 51, 53–58. [Google Scholar] [CrossRef]
- Cappadocia, M.C.; Pepler, D.; Cummings, J.G.; Craig, W. Individual motivations and characteristics associated with bystander intervention during bullying episodes among children and youth. Can. J. Sch. Psychol. 2012, 27, 201–216. [Google Scholar] [CrossRef]
- Brochado, S.; Soares, S.; Fraga, S. A scoping review on studies of cyberbullying prevalence among adolescents. Trauma Violence Abus. 2017, 18, 523–531. [Google Scholar] [CrossRef]
- Gámez-Guadix, M.; Orue, I.; Smith, P.K.; Calvete, E. Longitudinal and reciprocal relations of cyberbullying with depression, substance use, and problematic internet use among adolescents. J. Adolesc. Health 2013, 53, 446–452. [Google Scholar] [CrossRef]
- Ang, R.P.; Goh, D.H. Cyberbullying among adolescents: The role of affective and cognitive empathy, and gender. Child Psychiatry Hum. Dev. 2010, 41, 387–397. [Google Scholar] [CrossRef]
- Olweus, D. Cyberbullying: An overrated phenomenon? Eur. J. Dev. Psychol. 2012, 9, 520–538. [Google Scholar] [CrossRef]
- Rachoene, M.; Oyedemi, T. From self-expression to social aggression: Cyberbullying culture among South African youth on Facebook. Communicatio 2015, 41, 302–319. [Google Scholar] [CrossRef]
- Waasdorp, T.E.; Bradshaw, C.P. The overlap between cyberbullying and traditional bullying. J. Adolesc. Health 2015, 56, 483–488. [Google Scholar] [CrossRef] [PubMed]
- Della Cioppa, V.; O’Neil, A.; Craig, W. Learning from traditional bullying interventions: A review of research on cyberbullying and best practice. Aggress. Violent Behav. 2015, 23, 61–68. [Google Scholar] [CrossRef]
- Gradinger, P.; Yanagida, T.; Strohmeier, D.; Spiel, C. Prevention of cyberbullying and cyber victimization: evaluation of the visc social competence program. J. Sch. Violence 2015, 14, 87–110. [Google Scholar] [CrossRef]
- Gaffney, H.; Farrington, D.P.; Espelage, D.L.; Ttofi, M.M. Are cyberbullying intervention and prevention programs effective? A systematic and meta-analytical review. Aggress. Violent Behav. 2018. [Google Scholar] [CrossRef]
- Cross, D.; Shaw, T.; Hadwen, K.; Cardoso, P.; Slee, P.; Roberts, C.; Thomas, L.; Barnes, A. Longitudinal impact of the cyber friendly schools program on adolescents’ cyberbullying behavior. Aggress. Behav. 2016, 42, 166–180. [Google Scholar] [CrossRef]
- Burger, C.; Strohmeier, D.; Spröber, N.; Bauman, S.; Rigby, K. How teachers respond to school bullying: An examination of self-reported intervention strategy use, moderator effects, and concurrent use of multiple strategies. Teach. Teach. Educ. 2015, 51, 191–202. [Google Scholar] [CrossRef]
- Sakellariou, T.; Carroll, A.; Houghton, S. Rates of cyber victimization and bullying among male Australian primary and high school students. Sch. Psychol. Int. 2012, 33, 533–549. [Google Scholar] [CrossRef]
- Cross, D.; Barnes, A.; Papageorgiou, A.; Hadwen, K.; Hearn, L.; Lester, L. A social–ecological framework for understanding and reducing cyberbullying behaviors. Aggress. Violent Behav. 2015, 23, 109–117. [Google Scholar] [CrossRef]
- Barlett, C.P.; Gentile, D.A.; Dongdong, L.; Khoo, A. Predicting cyberbullying behavior from attitudes. J. Media Psychol. 2017, 1–11. [Google Scholar] [CrossRef]
- Macaulay, P.J.R.; Betts, L.R.; Stiller, J.; Kellezi, B. Perceptions and responses towards cyberbullying: A systematic review of teachers in the education system. Aggress. Violent Behav. 2018, 43, 1–12. [Google Scholar] [CrossRef]
- Green, V.A.; Johnston, M.; Mattioni, L.; Prior, T.; Harcourt, S.; Lynch, T. Who is responsible for addressing cyberbullying? Perspectives from teachers and senior managers. Int. J. Sch. Educ. Psychol. 2017, 5, 100–114. [Google Scholar] [CrossRef]
- Styron, R.A.; Bonner, J.L.; Styron, J.L.; Bridgeforth, J.; James, M.; Martin, C. Are teacher and principal candidates prepared to address student cyberbullying? J. At-Risk Issues 2016, 19, 19–28. [Google Scholar]
- Schultze-Krumbholz, A.; Schultze, M.; Zagorscak, P.; Wölfer, R.; Scheithauer, H. Feeling cybervictims’ pain—The effect of empathy training on cyberbullying. Aggress. Behav. 2016, 42, 147–156. [Google Scholar] [CrossRef] [PubMed]
- Boulton, M.J. Teachers’ self-efficacy, perceived effectiveness beliefs, and reported use of cognitive-behavioral approaches to bullying among pupils: Effects of in-service training with the I DECIDE program. Behav. Ther. 2014, 45, 328–343. [Google Scholar] [CrossRef]
- Del Rey, R.; Casas, J.A.; Ortega, R. Impact of the ConRed program on different cyberbulling roles. Aggress. Behav. 2016, 42, 123–135. [Google Scholar] [CrossRef]
- Rimal, R.N.; Lapinski, M.K. A re-explication of social norms, ten years later. Commun. Theory 2015, 25, 393–409. [Google Scholar] [CrossRef]
- Powell, K.C.; Kalina, C.J. Cognitive and social constructivism: Developing tools for an effective classroom. Education 2009, 130, 241–250. [Google Scholar]
- Joseph, N. Metacognition needed: Teaching middle and high school students to develop strategic learning skills. Prev. Sch. Fail. Altern. Educ. Child. Youth 2009, 54, 99–103. [Google Scholar] [CrossRef]
- Del-Rey-Alamillo, R.; Mora-Merchán, J.A.; Casas, J.-A.; Ortega-Ruiz, R.; Elipe, P. “Asegúrate” Program: Effects on cyber-aggression and its risk factors. Comunicar 2018, 26, 39–48. [Google Scholar] [CrossRef]
- García Hernández, I.; de la Cruz Blanco, G. Las guías didácticas: Recursos necesarios para el aprendizaje autónomo. Edumecentro 2014, 6, 162–175. [Google Scholar]
- Del Rey, R.; Casas, J.A.; Ortega-Ruiz, R.; Schultze-Krumbholz, A.; Scheithauer, H.; Smith, P.; Thompson, F.; Barkoukis, V.; Tsorbatzoudis, H.; Brighi, A.; et al. Structural validation and cross-cultural robustness of the European cyberbullying intervention project questionnaire. Comput. Hum. Behav. 2015, 50, 141–147. [Google Scholar] [CrossRef]
- Dehue, F. Cyberbullying research: New perspectives and alternative methodologies. Introduction to the Special Issue. J. Community Appl. Soc. Psychol. 2013, 23, 1–6. [Google Scholar] [CrossRef]
- Dehue, F.; Bolman, C.; Völlink, T. Cyberbullying: Youngsters’ experiences and parental perception. CyberPsychol. Behav. 2008, 11, 217–223. [Google Scholar] [CrossRef] [PubMed]
- Pouwels, J.L.; van Noorden, T.H.J.; Lansu, T.A.M.; Cillessen, A.H.N. The participant roles of bullying in different grades: Prevalence and social status profiles. Soc. Dev. 2018, 27, 732–747. [Google Scholar] [CrossRef] [Green Version]
- Gámez-Guadix, M.; Gini, G.; Calvete, E. Stability of cyberbullying victimization among adolescents: Prevalence and association with bully–victim status and psychosocial adjustment. Comput. Hum. Behav. 2015, 53, 140–148. [Google Scholar] [CrossRef]
- Cappadocia, M.C.; Craig, W.M.; Pepler, D. Cyberbullying: Prevalence, Stability, and risk factors during adolescence. Can. J. Sch. Psychol. 2013, 28, 171–192. [Google Scholar] [CrossRef]
- Cassidy, W.; Faucher, C.; Jackson, M. Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. Sch. Psychol. Int. 2013, 34, 575–612. [Google Scholar] [CrossRef]
- Tangen, D.; Campbell, M. Cyberbullying prevention: One primary school’s approach. J. Psychol. Couns. Sch. 2010, 20, 225–234. [Google Scholar] [CrossRef]
- Casas, J.A.; Ortega-Ruiz, R.; Del Rey, R. Bullying: The impact of teacher management and trait emotional intelligence. Br. J. Educ. Psychol. 2015, 85, 407–423. [Google Scholar] [CrossRef] [PubMed]
- Aldridge, J.M.; Fraser, B.J. Teachers’ views of their school climate and its relationship with teacher self-efficacy and job satisfaction. Learn. Environ. Res. 2016, 19, 291–307. [Google Scholar] [CrossRef]
- Hutson, E.; Kelly, S.; Militello, L.K. Systematic review of cyberbullying interventions for youth and parents with implications for evidence-based practice. Worldviews Evid.-Based Nurs. 2018, 15, 72–79. [Google Scholar] [CrossRef] [PubMed]
- Patchin, J.W.; Hinduja, S. Cyberbullying Prevention and Response: Expert Perspectives; Taylor and Francis: New York, NY, USA, 2012; ISBN 9780203818312. [Google Scholar]
- Zych, I.; Farrington, D.P.; Ttofi, M.M. Bullying and cyberbullying: Protective factors and effective interventions. Aggress. Violent Behav. 2018. [Google Scholar] [CrossRef]
Items | 0: No | 1: Yes, Once or Twice | 2: Yes, Once a Month | 3: Yes, Once a Week | 4: Yes, More Times a Week | |||||
---|---|---|---|---|---|---|---|---|---|---|
% Exp | % Contr | % Exp | % Contr | % Exp | % Contr | % Exp | % Contr | % Exp | % Contr | |
Someone said nasty things to me or called me names using Internet, social networks, or WhatsApp. | 72.6 | 79.9 | 22.2 | 16.3 | 2.7 | 2.4 | 0.7 | 0.6 | 1.7 | 0.9 |
Someone said nasty things about me to others using Internet, social networks, or WhatsApp. | 78.7 | 84.2 | 17 | 12.6 | 2.3 | 1.9 | 0.8 | 0.6 | 1.3 | 0.7 |
Someone threatened me through texts or online messages. | 88.1 | 92.5 | 10.1 | 6.5 | 0.9 | 0.7 | 0.3 | 0.2 | 0.6 | 0.1 |
Someone hacked into my account and stole personal information (e.g., through email or social networking accounts). | 94.2 | 96 | 5.3 | 3.7 | 0.2 | 0.1 | 0.1 | 0.1 | 0.2 | 0.1 |
Someone hacked into my account and pretended to be me (e.g., through instant messaging or social networking accounts). | 93.7 | 95.7 | 5.7 | 3.4 | 0.2 | 0.5 | 0.2 | 0 | 0.1 | 0 |
Someone created a fake account, pretending to be me (e.g., through instant messaging or social networking accounts). | 95.1 | 96.3 | 4.4 | 3.3 | 0.2 | 0.3 | 0.1 | 0 | 0.2 | 0 |
Someone posted personal information about me online. | 93.6 | 94.2 | 5.5 | 5.5 | 0.4 | 0.1 | 0.2 | 0 | 0.3 | 0.2 |
Someone posted embarrassing videos or pictures of me online. | 90.9 | 93 | 7.4 | 5.9 | 0.7 | 0.6 | 0.5 | 0.3 | 0.5 | 0.3 |
Someone altered pictures or videos of me that I had posted online. | 93.1 | 95.1 | 6.1 | 4.3 | 0.6 | 0.3 | 0.1 | 0.1 | 0.2 | 0.1 |
I was excluded or ignored by others in a social networking site or Internet. | 80.6 | 86.6 | 16.5 | 12.1 | 1.5 | 0.9 | 0.4 | 0.2 | 0.9 | 0.2 |
Someone spread rumors about me on the Internet. | 85.4 | 88.6 | 12.2 | 9.7 | 1.3 | 1.2 | 0.5 | 0.1 | 0.6 | 0.3 |
I said nasty things to someone or called them names using Internet, social networks, or WhatsApp. | 79 | 83.6 | 17.9 | 14 | 1.6 | 1.7 | 0.9 | 0.3 | 0.7 | 0.4 |
I said nasty things about someone to other people using Internet, social networks, or WhatsApp. | 82.6 | 85.5 | 14.6 | 12.3 | 1.4 | 1.4 | 0.8 | 0.5 | 0.7 | 0.4 |
I threatened someone through texts or online messages. | 94.4 | 97.1 | 4.7 | 2.3 | 0.5 | 0.3 | 0.1 | 0.2 | 0.3 | 0 |
I hacked into someone’s account and stole personal information (e.g., through email or social networking accounts). | 97.8 | 98.9 | 1.7 | 1.1 | 0.3 | 0 | 0 | 0 | 0.2 | 0 |
I hacked into someone’s account and pretended to be them (e.g., through instant messaging or social networking accounts). | 98.2 | 98.8 | 1.4 | 1.1 | 0 | 0 | 0.1 | 0 | 0.3 | 0.1 |
I created a fake account, pretending to be someone else (e.g., through instant messaging or social networking accounts). | 97 | 97.5 | 2.7 | 2.1 | 0.1 | 0.2 | 0.2 | 0.1 | 0.1 | 0 |
I posted personal information about someone online. | 97.9 | 98.4 | 1.7 | 1.3 | 0.3 | 0.1 | 0.2 | 0.1 | 0 | 0 |
I posted embarrassing videos or pictures of someone online. | 96.5 | 96.6 | 2.8 | 3 | 0.3 | 0.2 | 0.2 | 0.1 | 0.2 | 0.1 |
I altered pictures or videos of another person that had been posted online. | 95.2 | 96.3 | 4.4 | 3.1 | 0.2 | 0.2 | 0.2 | 0.2 | 0.1 | 0.1 |
I excluded or ignored someone in a social networking site or Internet. | 85.8 | 90.4 | 12 | 8.5 | 1 | 0.7 | 0.2 | 0.1 | 1 | 0.2 |
I spread rumors about someone on the Internet. | 93.9 | 95 | 5.1 | 4.3 | 0.3 | 0.4 | 0.3 | 0.2 | 0.3 | 0 |
% Not Involved | % Victims | % Aggressors | % Bully-Victims | |
---|---|---|---|---|
PreExperimental | 83.9 | 7.9 | 4.5 | 3.7 |
PostExperimental | 87.5 | 6.0 | 3.1 | 3.4 |
PreControl | 88.1 | 6.4 | 3.0 | 2.5 |
PostControl | 88.5 | 6.0 | 2.5 | 3.0 |
%Experimental Change | 4.29 | −24.05 | −31.11 | −8.10 |
%Control Change | 0.45 | −6.25 | −16.66 | 20 |
Items | Group | M (SD) | Lambda de Wilks F | p | |
---|---|---|---|---|---|
Pre | Post | ||||
General Victimization | Exper | 0.15 (0.25) | 0.12 (0.25) | 12.63 | ≥0.01 * |
Control | 0.10 (0.19) | 0.10 (0.22) | |||
General Aggression | Exper | 0.09 (0.18) | 0.06 (0.19) | 6.66 | 0.01 * |
Control | 0.06 (0.15) | 0.06 (0.16) | |||
Someone said nasty things to me or called me names using Internet, social networks, or WhatsApp. | Exper | 0.37 (0.73) | 0.33 (0.67) | 4.05 | 0.04 * |
Control | 0.26 (0.61) | 0.26 (0.62) | |||
Someone said nasty things about me to others using Internet, social networks, or WhatsApp. | Exper | 0.29 (0.67) | 0.25 (0.60) | 5.16 | 0.02 * |
Control | 0.21 (0.56) | 0.21 (0.56) | |||
Someone threatened me through texts or online messages. | Exper | 0.15 (0.48) | 0.13 (0.46) | 5.25 | 0.02 * |
Control | 0.09 (0.34) | 0.10 (0.41) | |||
Someone hacked into my account and stole personal information (e.g., through email or social networking accounts). | Exper | 0.07 (0.31) | 0.07 (0.36) | 1.17 | 0.29 |
Control | 0.05 (26) | 0.06 (0.30) | |||
Someone hacked into my account and pretended to be me (e.g., through instant messaging or social networking accounts). | Exper | 0.07 (31) | 0.07 (0.37) | 0.57 | 0.56 |
Control | 0.05 (0.23) | 0.05 (0.29) | |||
Someone created a fake account, pretending to be me (e.g., through instant messaging or social networking accounts). | Exper | 0.06 (0.29) | 0.06 (0.31) | 0.80 | 0.36 |
Control | 0.04 (0.22) | 0.05 (0.26) | |||
Someone posted personal information about me online. | Exper | 0.08 (0.36) | 0.07 (0.32) | 0.35 | 0.55 |
Control | 0.07 (0.29) | 0.06 (0.30) | |||
Someone posted embarrassing videos or pictures of me online. | Exper | 0.12 (0.45) | 0.09 (0.38) | 0.77 | 0.38 |
Control | 0.09 (0.38) | 0.07 (0.33) | |||
Someone altered pictures or videos of me that I had posted online. | Exper | 0.08 (0.33) | 0.07 (0.32) | 0.52 | 0.47 |
Control | 0.06 (0.28) | 0.05 (0.27) | |||
I was excluded or ignored by others in a social networking site or Internet. | Exper | 0.25 (0.59) | 0.16 (0.48) | 15.75 | ≥0.01 * |
Control | 0.15 (0.43) | 0.13 (0.43) | |||
Someone spread rumors about me on the Internet. | Exper | 0.19 (0.52) | 0.12 (0.42) | 9.42 | ≥0.01 * |
Control | 0.14 (0.43) | 0.12 (0.45) | |||
I said nasty things to someone or called them names Internet, social networks, or WhatsApp. | Exper | 0.27 (0.61) | 0.19 (0.53) | 14.66 | 0.00 * |
Control | 0.20 (0.51) | 0.19 (0.52) | |||
I said nasty things about someone to other people using Internet, social networks, or WhatsApp. | Exper | 0.23 (0.57) | 0.17 (0.52) | 1.4 | 0.23 |
Control | 0.18 (0.49) | 0.14 (0.44) | |||
I threatened someone through texts or online messages. | Exper | 0.07 (0.34) | 0.05 (0.28) | 5.87 | 0.01 * |
Control | 0.04 (0.24) | 0.05 (0.29) | |||
I hacked into someone’s account and stole personal information (e.g., through email or social networking accounts). | Exper | 0.03 (0.24) | 0.03 (0.24) | 3.76 | 0.05 |
Control | 0.01 (0.14) | 0.03 (0.25) | |||
I hacked into someone’s account and pretended to be them (e.g., through instant messaging or social networking accounts). | Exper | 0.03 (0.25) | 0.02 (0.21) | 2.2 | 0.13 |
Control | 0.02 (0.17) | 0.03 (0.23) | |||
I created a fake account, pretending to be someone else (e.g., through instant messaging or social networking accounts). | Exper | 0.04 (0.25) | 0.05 (0.28) | 1.21 | 0.27 |
Control | 0.03 (0.21) | 0.03 (0.23) | |||
I posted personal information about someone online. | Exper | 0.03 (0.21) | 0.03 (0.25) | 0.01 | 0.96 |
Control | 0.02 (0.16) | 0.03 (0.19) | |||
I posted embarrassing videos or pictures of someone online. | Exper | 0.05 (0.30) | 0.04 (0.26) | 0.01 | 0.99 |
Control | 0.04 (0.24) | 0.04 (0.25) | |||
I altered pictures or videos of another person that had been posted online. | Exper | 0.05 (0.27) | 0.04 (0.24) | 0.93 | 0.33 |
Control | 0.05 (0.27) | 0.04 (0.26) | |||
I excluded or ignored someone in a social networking site or Internet. | Exper | 0.19 (0.55) | 0.11 (0.42) | 7.21 | ≥0.01 * |
Control | 0.11 (0.38) | 0.08 (0.33) | |||
I spread rumors about someone on the Internet. | Exper | 0.08 (0.37) | 0.07 (0.37) | 0.10 | 0.75 |
Control | 0.06 (0.26) | 0.05 (.28) |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Del Rey, R.; Ortega-Ruiz, R.; Casas, J.A. Asegúrate: An Intervention Program against Cyberbullying Based on Teachers’ Commitment and on Design of Its Instructional Materials. Int. J. Environ. Res. Public Health 2019, 16, 434. https://doi.org/10.3390/ijerph16030434
Del Rey R, Ortega-Ruiz R, Casas JA. Asegúrate: An Intervention Program against Cyberbullying Based on Teachers’ Commitment and on Design of Its Instructional Materials. International Journal of Environmental Research and Public Health. 2019; 16(3):434. https://doi.org/10.3390/ijerph16030434
Chicago/Turabian StyleDel Rey, Rosario, Rosario Ortega-Ruiz, and José Antonio Casas. 2019. "Asegúrate: An Intervention Program against Cyberbullying Based on Teachers’ Commitment and on Design of Its Instructional Materials" International Journal of Environmental Research and Public Health 16, no. 3: 434. https://doi.org/10.3390/ijerph16030434
APA StyleDel Rey, R., Ortega-Ruiz, R., & Casas, J. A. (2019). Asegúrate: An Intervention Program against Cyberbullying Based on Teachers’ Commitment and on Design of Its Instructional Materials. International Journal of Environmental Research and Public Health, 16(3), 434. https://doi.org/10.3390/ijerph16030434