You are currently viewing a new version of our website. To view the old version click .
Children
  • Editor’s Choice
  • Review
  • Open Access

8 February 2023

Cyberbullying as a Learned Behavior: Theoretical and Applied Implications

Department of Psychological Sciences, Kansas State University, 492 Bluemont Hall, Manhattan, KS 66506, USA
This article belongs to the Section Pediatric Mental Health

Abstract

Cyberbullying perpetration has emerged as a world-wide societal issue. Interventions need to be continuously updated to help reduce cyberbullying perpetration. We believe that data derived from theory can best accomplish this objective. Here, we argue for the importance of learning theory to understand cyberbullying perpetration. The purpose of this manuscript is to firstly describe the various learning theories that are applicable to describe cyberbullying perpetration, such as social learning, operant conditioning, the general learning model, and others. Second, we delve into the Barlett Gentile Cyberbullying Model, which integrates learning postulates and distinguishes cyber from traditional bullying. Finally, we offer a learning perspective on interventions and future research.

1. Introduction

Technological innovation has paved the way for near instantaneous world-wide communication via the Internet. The adoption of the Internet, juxtaposed with (a) increased technology capabilities, (b) affordable software and hardware, and (c) accessibility, have changed nearly every sector in the industrialized world, such as education, medicine, banking, business, and others. As such, the Internet is used frequently by adults and youth alike. Recent survey data show that 97% of US youth [1] and 93% of US adults are online daily [2]. While most Internet behavior is likely unharmful, there are some who use the Internet for nefarious purposes, such as hacking, sending unwanted sexual depictions, and illegally downloading content. While continued empirical attention to these harmful online behaviors is needed, the purpose of the current paper will be on cyberbullying—defined as repeated unwanted and harmful behavior via online technology [3]. Results from a systematic review of the literature estimate the prevalence of cyberbullying perpetration to be between 6.3% and 32% [4].
Meta-analytic reviews have documented the correlations between myriad deleterious psychological variables (depression, anxiety, etc.) and cyberbullying perpetration [5]. It is imperative, therefore, that cyberbullying perpetration be reduced. One method to potentially decrease the frequency of cyberbullying perpetration is to better understand the variables and processes that predict its frequency to better inform intervention efforts. Results from several meta-analytic reviews suggest that cyberbullying perpetration-focused interventions are successful [6,7,8,9,10,11,12]. Although these meta-analyses differ in their scope, articles retrieved, publication date, effect size used, and other differences, the results all converge to suggest that cyberbullying perpetration interventions are effective.
The primary literature that was sampled and synthesized in cyberbullying intervention meta-analyses differ greatly in their theoretical perspective. For example, Media Heroes [13], iZ Hero [14], and a video intervention to reduce cyberbullying [15] all employ the theory of reasoned action/planned behavior in their lessons. Cyber-Friendly Schools [16] and Tabby [17] apply social ecological theory to cyberbullying prevention. Finally, ConRED [18] uses the theory of normalized social behavior to reduce cyberbullying perpetration. Overall, the application of existing theories to prevent cyberbullying is welcomed, and a recent burgeoning of empirical research that purports to predict cyberbullying perpetration and/or validate a cyberbullying intervention has adopted a wealth of theoretical perspectives. We contend here that many of the theoretical strides made in this literature and the research on intervention efficacy can be explained more holistically with learning theory. There are too few studies that have directly applied learning theory to understand cyberbullying perpetration, which negates using systematic literature review techniques to summarize the literature. Instead, our aim is to summarize the relevant literature that applies learning theory to cyberbullying perpetration. First, we will elucidate the learning theories relevant to cyberbullying perpetration. Second, we will apply learning theory to understand cyberbullying perpetration and extend those findings to interventions. Finally, we conclude with suggestions for future work. Our thesis is that cyberbullying is a learned behavior that becomes automated over time via experience and reinforcement. If our central claim is valid then, logically, it should follow that cyberbullying perpetration frequency can be reduced using similar learning postulates within an intervention context.

2. Learning Theory

Before delving into the evidence that cyberbullying can be explained from a learning perspective, it is imperative to understand learning theory. That is, what processes and variables are important for social behavior to be learned? By learning, we mean, “…changes in the behavior of an organism that result from regularities in the environment of the organism” ([19]; p. 631). Historical reviews have thoroughly documented the evolution of learning research—from theory focusing on a very few specific processes to more general theories that integrate multiple processes [20]. Although we will not present an exhaustive list of all learning theories, we will focus on the theories that have application to cyberbullying.

5. Cyberbullying Perpetration as a Learned Social Behavior

Again, our central thesis is that cyberbullying perpetration is a learned social behavior. However, before delving into the evidence to support this thesis, an important question must be answered: What is the importance of understanding cyberbullying through a learning lens? We have noted elsewhere [62] that the best way to prevent antisocial behavior is to understand the psychological processes and variables germane to that behavior so that intervention efforts can be armed with the best possible information in order to be most successful. While multiple theoretical perspectives offer insights into cyberbullying that can accomplish the goal of understanding cyberbullying perpetration, a learning perspective offers important theoretical insights. For example, if social learning and operant conditioning postulates can be extended to cyberbullying, then interventions that focus on stopping positive reinforcement of cyberbullying actions should undermine the learning of cyberbullying attitudes, beliefs, and cognitions that likely predict its frequency. Moreover, a learning perspective highlights the need for interventions focused on parental, peer, and school entities in addition to the child’s education to prevent future cyberbullying perpetration. These and other examples highlight how learning theory as applied to cyberbullying perpetration can offer a unique application to prevention.
Can a learning theory, such as GLM, explain cyberbullying perpetration? We believe that it can. Figure 1 displays how we believe that cyberbullying can be explained by the distal GLM [63]. Three important points are noteworthy regarding Figure 1. First, GLM postulates can explain the development of cyberbullying through several learning processes and constructs. In Figure 1 we replaced the theoretical constructs of GLM depicted on the left with the labels of variables found in the literature on cyberbullying perpetration on the right (we denoted these additions in yellow for ease of readability). Second, there are still many questions remaining that have received little to no empirical attention. For instance, we are unaware of any research investigating the “chunking/encoding” learning that GLM classifies as a cognitive-behavioral construct, which we will elaborate on later. Third, it is likely that some of the learning processes elucidated in the GLM do not transfer onto cyberbullying well. For instance, GLM notes physical skill as a learning process, which dictates how continued practice with a behavior automatizes a behavior. Physical skill as a cognitive-behavioral construct is clearly applicable to myriad trained behaviors, such as driving a car or shooting a free throw in basketball; however, it is less clear how this transitions to online bullying.
Figure 1. GLM applications to cyberbullying perpetration. Adapted with permission from Gentile et al. (2009). Copyright 2009 Sage Publications.
Evidence from empirical studies support the application of GLM to understand cyberbullying perpetration. We will elaborate on such transitions below:

5.1. Perceptual and Cognitive Constructs

There are three constructs within this section of GLM. The first is perceptual and expectation schemata, which describe cognitive knowledge structures regarding an individual’s behavior or behavior of others, and research has shown that cyberbullying is correlates with—and predicts—several of these knowledge structures. Perceptions of anonymity represent an individualized perceptual schema, in which individuals believe themselves to be less likely to be identified in online environments. Correlational [64] and longitudinal [65] findings show that cyberbullying is related to these perceptions. In an interesting study, Sticca and Perren [66] had youth read several hypothetical scenarios that described a peer who was excluded from a party, and the scenarios differed on whether the communication was delivered online or in person and if the message was anonymous or not. Participants then rated the scenario on aggression severity and humiliation, and results showed that the more humiliating and threatening scenario was when the rejection was online and anonymous. These findings can be best explained by online disinhibition theory [67], which posits that individuals are likely disinhibited in online (versus face-to-face) environments, which change the likelihood of aggressive behaviors (amongst other outcomes). For instance, the perceived anonymity afforded an online aggressor, juxtaposed with asynchronicity (the lack of real time interactions online), the minimization of status (absence of cues indicative of status or authority), and other constructs, likely increase cyberbullying [68]. Moreover, research has shown that cyberbullying perpetration correlates positively [69,70,71] with normative aggressive beliefs (NOBAG; the cognitive belief that aggression is acceptable after a perceived provocation [72]), and with cognitive interpretation of ambiguous situations as hostile [73], termed hostile attribution biases (HAB [74]). Moreover, GLM posits that several beliefs and scripts are important perceptual and cognitive constructs. One belief that has been shown to predict cyberbullying is the belief in the irrelevance of muscularity for online bullying (BIMOB). BIMOB is a belief theorized to be the consequence of cyber-aggression which emphasizes the common belief that anybody—no matter how physically small or weak—can harm others due to the online nature of cyberbullying [25]. Finally, research has shown that cyberbullying expectations (a behavioral script for the likelihood of future cyberbullying) is predicted by myriad variables that share variance with cyberbullying perpetration, such as moral disengagement, positive cyberbullying norms, and self-efficacy [75].

5.2. Cognitive-Behavioral Constructs

Gentile and Gentile [22] explicated several types of learned outcomes that are classified as cognitive-behavioral that form a function of continued practice. Evidence for learned cognitive-behavioral constructs can be seen by comparing experts to novices on some tasks. The translation of these GLM tenets to cyberbullying is less clear. While it is true that differences in conduct problems, prosocial behavior, and hyperactivity-inattention emerge between cyberbullies, cyber-victims, cyberbully-victims, and uninvolved youth [76], the conceptualization of an “expert cyberbully” is difficult. Moreover, the exact encoding and mental processing of cyberbullying-related information in the moment remains unclear. Therefore, we contend that the cognitive-behavioral portion of the distal GLM is in need of empirical attention and study.

5.3. Cognitive-Emotional Constructs

Attitudes and stereotypes are the two constructs that are labeled as cognitive-emotional according to GLM [22]. There is a rich social psychological literature showing that attitudes predict behavior [77], and research has shown that positive cyberbullying attitudes—evaluating cyberbullying as positive and/or justified—positively correlates with cyberbullying behavior [78]. For instance, using a correlational design with US adults, Doane et al. [79] showed that cyberbullying attitudes significantly predicted three types of cyberbullying (deception, malice, and public humiliation) indirectly through cyberbullying intentions. Moreover, several correlational studies show that cyberbullying attitudes directly predict cyberbullying perpetration [80], whereas other research findings suggest an indirect effect of cyberbullying attitudes to cyberbullying perpetration through behavioral intentions [81]. Finally, there is a paucity of research examining the relationship between stereotypes and cyberbullying; however, scholars have theorized about such a link. Indeed, Keum and Miller [82] described a model of online racism, which posits that online anonymity perceptions predict online disinhibition (described earlier) to predict in-group biases and stereotype formation. We are unaware of any primary research validating this model, and future work is needed.

5.4. Emotional Constructs

The final organizational section of the distal GLM consists of emotional constructs, which consist of several processes germane to changing personality as a function of repeated learning [22]. Affective habituation refers to the learned association between the behavior and emotional constructs (e.g., cyberbullying others is associated with excitement). Research employing the uses and gratifications framework [83] has shown that one possible motive for cyberbullying others is the entertainment and revenge that participants classified as cyberbully-victims (individuals who are both victimized and perpetrate online bullying) experience in harming others online [84]. Next, GLM includes conditioned emotions, which includes desensitization—the decreased emotional, physiological, and cognitive response to a stimulus [85], which can be operationalized via empathy [86]. Results from meta-analyses show that empathy is related to cyberbullying perpetration [5]. Finally, Gentile and Gentile [22] noted that affective traits—personality dimensions related to emotional expression—are conceptualized as an emotional construct within GLM. Research has shown that cyberbullying perpetration is correlated with several affective traits, including trait anger [87], neuroticism [88], and emotional intelligence [89].

6. Uniquely Predicting Cyberbullying

Despite the growing research support for GLM applications to cyberbullying, one caveat is that most learning theories are not specific to the online world—GLM included. Instead, both domain-specific and integrated learning theories can predict myriad antisocial behaviors, including cyberbullying, traditional bullying, and aggression. Indeed, one strength of GLM is its ability to describe and predict a plethora of behaviors, not just cyberbullying. Theoretical specification to online behavior is greatly needed in the cyberbullying domain because: (a) cyberbullying is specific to online mediums, making it theoretically distinct from traditional forms of bullying and aggression; and (b) cyberbullying interventions can be better informed with theory devoted specifically to online harm. Cyberbullying is unique because of the increased anonymity afforded to the online aggressor, the irrelevance of one’s physical stature, the non-physical nature of cyberbullying, the ability to have others see the online harm across the world at instantaneous speed, and other factors [90].
The theoretical gap in uniquely predicting cyberbullying incrementally from more traditional forms of bullying using learning-based underpinnings was filled with the validation of the Barlett Gentile Cyberbullying Model (BGCM [25]). Derived from the theoretical postulates of the general learning model, the BGCM posits that after youth cyber-attack another for the first time, they likely learn to perceive themselves as more anonymous online and learn that their physical stature is moot due to the online environment necessary for cyberbullying to occur (BIMOB). Continued cyber-attacks further develop and eventually automatize these perceptions and beliefs to form positive cyberbullying attitudes, which eventually become automatized to yield subsequent cyberbullying behavior. The importance of automatization and development highlight the learning emphasis of the BGCM. Figure 2 depicts the BGCM and highlights the learning stages that link initial cyber-aggressive actions to eventual development of cyberbullying propensities.
Figure 2. Barlett Gentile Cyberbullying Model.
The BGCM has received much empirical support. Indeed, research has shown that Wave 2 cyberbullying attitudes mediate the longitudinal relationships between Wave 1 anonymity and BIMOB with Wave 3 cyberbullying perpetration [91]. Importantly, BGCM postulates remain significant while controlling for traditional bullying perpetration [92]. This is important to show the incremental validity of the evidence that the BGCM predicts cyberbullying above and beyond traditional bullying, despite the high correlation between both forms of bullying perpetration [5]. Finally, research has shown that BGCM relationships are observed in countries across the world [93].
The core learning postulate of the BGCM is that each cyber-attack perpetrated is a learning trial, and longitudinal research has shown support for the learning tenets of BGCM—and by extension the GLM. For example, Barlett et al. [94] used a three-wave longitudinal design sampling Singaporean youth and found (a) strong stability over time for cyberbullying attitudes and cyberbullying perpetration, (b) early cyberbullying attitudes predicted later cyberbullying perpetration (consistent with BGCM), and (c) early cyberbullying perpetration predicted later cyberbullying attitudes (consistent with learning). In other words, cyberbullying attitudes reinforced cyberbullying perpetration, and, in turn, cyberbullying perpetration further reinforced cyberbullying attitudes. Moreover, Barlett and Kowalewski [95] used a four-wave longitudinal design with an emerging adult sample and showed that (a) Wave 1 anonymity perceptions and BIMOB predicted Wave 2 cyberbullying attitudes to predict Wave 3 cyberbullying behavior, consistent with BGCM, and (b) Wave 3 cyberbullying perpetration predicted Wave 4 anonymity perceptions and BIMOB, consistent with the learning theory. This is an important finding because this shows that continued cyberbullying perpetration—which was derived from BGCM tenets—further reinforces cyberbullying-related knowledge structures, supporting the feedback loop germane to BGCM processes.

7. Moderators in the Learning of Cyberbullying

The wealth of support for the BGCM validates the theoretical postulates and applied implications of this theory to understand and ultimately reduce cyberbullying. However, we do not believe that the current version of the BGCM depicted in Figure 1 is ubiquitous. Individual differences likely influence each observed variable in the BGCM framework and the underlying learning underpinnings of BGCM. Each will be briefly discussed.
First, research has shown substantial individual differences in cyberbullying perpetration. We have already elucidated several of these variables (in the cognitive learning section), but several other individual difference variables predict cyberbullying. For instance, meta-analytic results show sex differences in cyberbullying are moderated by age—males are more likely to cyberbully than females at older ages (emerging adult and above), but females are more likely to cyberbully than males at young ages (approximately 9–11 years old) [96]. Moreover, Barlett et al. [91] showed that emerging adult males had higher levels of anonymity perceptions and cyberbullying attitudes compared to emerging adult females. In addition to age and participant sex, other personality variables have been shown to moderate key relationships. Barlett et al. [97] used a cross-sectional study of US adults and showed that cyberbullying attitudes mediated the relationship between anonymity perceptions and cyberbullying perpetration (supporting BGCM); however, the relationship between anonymity and cyberbullying attitudes was moderated by dispositional fear of retaliation—a personality variable that measures the extent to which one is afraid of another’s retaliation and changes their behavior. Closer examination of this moderated effect suggests that people who perceive themselves as anonymous online are likely to endorse cyberbullying attitudes when they are fearful of another’s retaliation.
Second, technological moderators likely influence BGCM processes. Technological moderators are those individual differences that are specific to technology, such as time spent online and technology access. Indeed, research using a cross-sectional design showed that time spent online predicted BIMOB and anonymity perceptions, and that perceptions of technology access correlated with cyberbullying attitudes [98]. Moreover, self-efficacy related to the ability to cyberbully others (e.g., having the ability to create and send a computer virus) correlated with cyberbullying perpetration [99].
We want to explicate that there is no published research testing the moderating influence of any of these variables in BGCM processes. Future work is needed to uncover what variables moderate the learning explicated by BGCM; however, the general learning model theorizing posits that biological (e.g., genes, sex) and environmental modifiers (e.g., internet access, SES, living conditions) influence the learning of social behaviors [22]. This theorizing gives precedent to study myriad moderating variables within the context of BGCM learning—despite the paucity of work in this domain. Figure 3 displays a conceptual model of the role that various moderators may have on BGCM.
Figure 3. Conceptual Moderating Influence on BGCM Processes.
The moderating influence of myriad variables in the cyberbullying process has implications for intervention efforts. Within the context of cognitive learning, research has shown that school staff’s self-efficacy beliefs in intervening in a cyberbullying incident are moderated by school status—when self-efficacy beliefs are low, low-status staff are less likely to intervene compared to high-status staff [100]. In theory, if staff (or anyone) intervenes in a cyberbullying incident, then the perpetrator will likely not be positively reinforced for their online behavior to mitigate BGCM learning.

8. Intervention Applications

Results from several meta-analyses showed that interventions derived to reduce cyberbullying perpetration are successful [8]. These interventions vary widely in their focus, populations that the intervention is normed around, the degree of cyberbullying reduction, the study design, and others. Cioppa et al. [101] reviewed several cyberbullying interventions and rated each on ease of implementation (e.g., manual and training is available, instrumentation for evaluation is available) and scientific merit (e.g., having multiple sites, employing a control group, tailoring the program to a population based on pre-screening), and results showed great variability across the 12 evaluated interventions. Interestingly, the grading rubric for the scientific merit of these interventions omitted the application and use of theory. As we already articulated, many of the published interventions are derived—in part—based on theoretical underpinnings that vary greatly in their focus. Perhaps the reason for this omission is that most of the interventions do indeed utilize theory; however, meta-analytic work focused on parent-related interventions to reduce cyberbullying in youth found that the effect sizes are stronger (more effective interventions) when theory was used compared to effect sizes from studies that do not utilize theory [12].
Myriad theories have been applied to intervention lessons; however, very few utilize tenets specific to learning theory. We want to explicate that we are not implying intervention participants are not learning valuable skills that have ramifications for behavior, nor are we implying that intervention lessons are not using pedagogy consistent with learning. However, our perspective is that most cyberbullying interventions that use theory do not adequately utilize all learning theory postulates. Using the GLM as a guide (Figure 1), we will discuss interventions that have utilized a portion of learning theory in their lessons—to great success.
GLM delineates that after repeated learning and practice, one class of learned constructs consists of perceptual and cognitive constructs, which include perceptual and expectation schemata, beliefs, and scripts. We argued that there is a rich literature in the cyberbullying domain that maps onto these learning constructs, such as anonymity, online disinhibition, hostile attribution biases, and normative aggressive beliefs. For instance, Media Heroes [13] and ConRED [18] include lessons that outline the legal and social consequences to perpetrating online harm—consequences that many youths may not be aware of. If a student in these, and other, programs learn of the consequences of cyberbullying others, then they may learn to expect those ramifications, which fits into GLM theorizing. Focused on anonymity and online disinhibition, emerging adult participants in the You’re Not Anonymous cyberbullying intervention group received training on how their online behaviors are not as anonymous as one would believe and had a significant decrease in self-reported anonymity perceptions compared to participants in the control condition, and anonymity perceptions predicted cyberbullying perpetration several months later [102]. Finally, although we are unaware of cyberbullying interventions that specifically target normative aggressive beliefs or hostile attribution biases directly, interventions that target aggression (more broadly) by helping youth identify and tackle aggression in their classroom and fostering a safe school environment through social skills training and group work have been shown to effectively curb cyberbullying perpetration for youth in the intervention program compared to youth not in the program (ViSC [103]).
Next, the cognitive-emotional constructs outlined in GLM include attitudes and stereotypes, which map onto cyberbullying attitudes and stereotypes. The video intervention to reduce cyberbullying created by Doane and colleagues [15] has implications for these GLM tenets. Emerging adults were presented with intervention materials that included (a) news stories of youth who committed suicide after being cyber-victimized, (b) information about what cyberbullying is and various risk and outcome factors to increase cyberbullying knowledge, and (c) acted vignettes of common cyberbullying events. Results showed that cyberbullying attitudes significantly decreased for participants in the intervention group compared to participants in the control group.
Finally, GLM posits that affective habituation, conditioned emotions, and affective traits are emotional constructs learned after repeated learning. We then argued that empathy, desensitization, and various other personality and motivational variables (e.g., revenge motivation, anger, neuroticism) can be organized within this class of variables. Many interventions (e.g., Media Heroes [13]; the KiVA program [104]) utilize empathy training as one, of many, key component to reduce cyberbullying.
Overall, several meta-analyses show the efficacy of cyberbullying interventions at reducing participant cyberbullying behavior, and the specific lessons across these interventions target processes delineated by GLM [22] as applicable to cyberbullying perpetration. However, much more work is needed. Here we offer some important recommendations that necessitate future work:
First, the BGCM and GLM both emphasize positively reinforced learning as an important mechanism in cyberbullying development. Therefore, it is prudent that interventions incorporate the entities that can reinforce or punish cyberbullying actions. Indeed, Barlett (2019) noted that cyberbullying prevention necessitates a multi-entity approach—parents, peers, the school, and the individual are all necessary to stop cyberbullying perpetration. Fortunately, many intervention programs include parents [18] and peers [105] in their approach. However, most of the lessons given to the larger community focus on cyberbullying knowledge (definitions, effects, motivations, etc.) without focusing on the reinforcement. We argue that interventions that target many interested groups are wonderful and cyberbullying knowledge is important. Perhaps additional information regarding how to appropriate reinforce or punish cyberbullying actions can help make these interventions more effective. However, this is an empirical question that requires future work.
Second, the evidence we presented to support the contention that cyberbullying is a learned social behavior suggests that cyberbullying interventions need to be administered to participants who are in a developmentally appropriate age range—old enough to understand the content of the intervention but young enough to begin to have access to online technologies and start using social media independent of their parents/guardians. For instance, Englander [106] showed that youth aged 8–11 started cyberbullying others, especially when they owned a cellular phone. Much thought will be needed to address the issue of participant age if such a cyberbullying curriculum can be tailored to elementary-school-aged youth.
Third, theories used to predict cyberbullying argue for myriad potential mediating variables that describe why cyberbullying perpetration occurs. Cyberbullying perpetration interventions target several of these, such as attitudes [15], empathy [13], aggressive behaviors [103], and others. However, several other potential mediators are left understudied. For example, we are unaware of any interventions that target emotional intelligence, BIMOB, stereotypes, or revenge or fun-seeking motives—all explicated by GLM (Figure 1). Perhaps several of these variables change as a function of intervention lessons. For example, showing participants stories about youth who committed suicide after cyber-victimization incidents [15] may decrease fun-seeking motivations for cyberbullying others; however, this—and other variables—have not been tested. We understand that intervention specialists cannot measure every possible mediator, and we are not advocating for any one intervention or study to do that. Our position, though, is that other mediating variables that predict cyberbullying perpetration and can be the target of intervention lessons need to be studied in future work.

9. Future Work

While the notion of using learning theory and research to understand and ultimately reduce cyberbullying perpetration is not novel, there is surprisingly a few studies that have tested and validated such claims. There is a much room for future work, and we will elucidate some of these ideas here. First, we are unaware of any studies that have tested hypotheses important for exemplifying cyberbullying learning, such as: (a) the number of proximate GLM trials needed to develop cyberbullying knowledge structures in the distal GLM, (b) whether reinforcement/punishment moderates these learning tenets, and (c) the temporal ordering of variables within GLM to cause cyberbullying behavior to be learned. To answer these important questions, researchers would need to conduct a longitudinal study that samples youth participants who have never cyberbullied another nor been cyber-victimized at Wave 1 and then assess their cyberbullying-related knowledge structures and behavior in subsequent waves. Such a study design would identify youth who have (versus have not) engaged in cyberbullying behaviors and examine the longitudinal predictors of such learning. Such a study is procedurally questionable; however, if such a study can be conducted then many questions can be answered.
Second, we believe that the importance of reinforcement in the BGCM is an understated and understudied postulate that is desperately in need of future work. A paucity of research has examined the peer/family reinforcement positive correlation with cyberbullying [25], and much more longitudinal work is needed. Conversely, operant conditioning (and GLM/BGCM) posits that punishment may be helpful to reduce the likelihood of subsequent cyberbullying; however, we few studies have tested these predictions. We perceive punishment from parents/guardians as one method; however, punishment from peers, the victim’s retaliation, and oneself are all possible. For instance, the Media Heroes cyberbullying curriculum includes lessons specific to teaching youth about the legal consequences of cyberbullying [13]; however, while Media Heroes is effective at reducing cyberbullying, we are unaware of any research specifically delving into that component of the curriculum. Future work is needed to test whether informing participants about the legal ramifications is deterrent enough to reduce cyberbullying via operant conditioning tenets.
Finally, a state-based paradigm for measuring cyberbullying (or cyber-aggression) is desperately needed. To date, scientists have relied on vignettes to experimentally manipulate some aspect of a hypothetical cyberbullying event, which should not be interpreted as behavior. The challenge for scholars is to attempt to quantify online statements as hostile when those same statements are difficult to interpret given the lack of tone, sarcasm, emphasis, etc., that is common across online communication [107]. Research tools are getting closer to accomplishing this goal. For instance, Rezvani and Beheshti [108] validated computer software to detect cyberbullying, and future work should attempt to utilize these innovative programs to measure cyberbullying behavior in the moment.

10. Overall Conclusions

Scholars, school administrators, teachers, doctors, parents, and school pupils all recognize that cyberbullying perpetration and victimization are important topics. The purpose of the current manuscript was to argue that cyberbullying can be explained using learning theory—the general learning model and Barlett Gentile cyberbullying model. However, we also aimed to highlight the need for continued research that applies these, and other, theories to cyberbullying. Overall, we hope that a better understanding of the processes germane to cyberbullying can help guide intervention efforts that successfully reduce cyberbullying perpetration.

Funding

This research received no external funding.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Vogels, E.A.; Gelles-Watnick, R.; Massarat, N. Teens, Social Media and Technology. 2022. Available online: https://www.pewresearch.org/internet/2022/08/10/teens-social-media-and-technology-2022/ (accessed on 3 January 2023).
  2. Pew Research Center. Internet/Broadband Fact Sheet. 2021. Available online: https://www.pewresearch.org/internet/fact-sheet/internet-broadband/ (accessed on 3 January 2023).
  3. Smith, P.K.; Mahdavi, J.; Cavalho, M.; Fisher, S.; Russell, S.; Tippett, N. Cyberbullying: Its nature and impact in secondary school pupils. J. Child Psychol. Psychiatry 2008, 49, 376–385. [Google Scholar] [CrossRef] [PubMed]
  4. Zhu, C.; Huang, S.; Evans, R.; Zhang, W. Cyberbullying among adolescents and children: A comprehensive review of the global situation, risk factors, and preventive measures. Front. Public Health 2021, 9, 634909. [Google Scholar] [CrossRef] [PubMed]
  5. Kowalski, R.M.; Giumetti, G.W.; Schroeder, A.N.; Lattanner, M.R. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychol. Bull. 2014, 140, 1073–1137. [Google Scholar] [CrossRef] [PubMed]
  6. Chen, Q.; Chan, K.L.; Guo, S.; Chen, M.; Lo, C.K.; Ip, P. Effectiveness of digital health interventions in reducing bullying and cyberbullying: A meta-analysis. Trauma Violence Abus. 2022, in press. [Google Scholar] [CrossRef] [PubMed]
  7. Fraguas, D.; Diaz-Caneja, C.M.; Ayora, M.; Duran-Cutilla, M.; Abregu-Crespo, R.; Ezquiaga-Bravo, I.; Martin-Babarro, J.; Arango, C. Assessment of school anti-bullying interventions: A meta-analysis of randomized clinical trials. JAMA Pediatr. 2021, 175, 44–55. [Google Scholar] [CrossRef]
  8. Gaffney, H.; Farrington, D.P.; Espelage, D.L.; Ttofi, M.M. Are cyberbullying intervention and prevention programs effective? A systematic and meta-analytical review. Aggress. Violent Behav. 2019, 45, 134–153. [Google Scholar] [CrossRef]
  9. Lan, M.; Law, N.; Pan, Q. Effectiveness of anti-cyberbullying educational programs: A socio-ecologically grounded systematic review and meta-analysis. Comput. Hum. Behav. 2022, 130, 107200. [Google Scholar] [CrossRef]
  10. Ng, E.D.; Chua, J.Y.X.; Shorey, S. The effectiveness of educational interventions on traditional bullying and cyberbullying among adolescents: A systematic review and meta-analysis. Trauma Violence Abus. 2022, 23, 132–151. [Google Scholar] [CrossRef]
  11. Polanin, J.R.; Espelage, D.L.; Grotpeter, J.K.; Ingram, K.; Michaelson, L.; Spinney, E.; Valido, A.; Torgal, C.; Robinson, L. A systematic review and meta-analysis of interventions to decrease cyberbullying perpetration and victimization. Prev. Sci. 2022, 23, 439–454. [Google Scholar] [CrossRef]
  12. Wang, L.; Jiang, S. Effectiveness of parent-related interventions on cyberbullying among adolescents: A systematic review and meta-analysis. Trauma Violence Abus. 2022, in press. [Google Scholar] [CrossRef]
  13. Schultze-Krumbholz, A.; Schultze, M.; Zagorscak, P.; Wölfer, R.; Scheithauer, H. Feeling cybervictims’ pain—The effect of empathy training on cyberbullying. Aggress. Behav. 2016, 42, 147–156. [Google Scholar] [CrossRef]
  14. Liau, A.K.; Park, Y.; Gentile, D.A.; Katna, D.P.; Tan, C.H.A.; Khoo, A. iZ HERO adventure: Evaluating the effectiveness of a peer-mentoring and transmedia cyberwellness program for children. Psychol. Pop. Media Cult. 2017, 6, 326–337. [Google Scholar] [CrossRef]
  15. Doane, A.N.; Kelley, M.L.; Pearson, M.R. Reducing cyberbullying: A theory of reasoned action-based video prevention program for college students. Aggress. Behav. 2016, 42, 136–146. [Google Scholar] [CrossRef]
  16. Cross, D.; Shaw, T.; Hadwen, K.; Cardoso, P.; Slee, P.; Roberts, C.; Thomas, L.; Barnes, A. Longitudinal impact of the Cyber Friendly Schools Program on adolescents’ cyberbullying behavior. Aggress. Behav. 2016, 42, 166–180. [Google Scholar] [CrossRef]
  17. Sorrentino, A.; Baldry, A.C.; Farrington, D.P. The efficacy of the Tabby improved prevention and intervention program in reducing cyberbullying and cybervictimization among students. Int. J. Environ. Res. Public Health 2018, 15, 2536. [Google Scholar] [CrossRef]
  18. Ortega-Ruiz, R.; Del Rey, R.; Casas, J.A. Knowing, building and living together on Internet and social networks: The ConRED cyberbullying prevention program. Int. J. Confl. Violence 2012, 6, 302–312. [Google Scholar]
  19. De Houwer, J.; Barnes-Holmes, D.; Moors, A. What is learning? On the nature and merits of a functional definition of learning. Psychon. Bull. Rev. 2013, 20, 631–642. [Google Scholar] [CrossRef]
  20. Illeris, K. An overview of the history of learning theory. Eur. J. Educ. 2018, 53, 86–101. [Google Scholar] [CrossRef]
  21. Carnagey, N.L.; Anderson, C.A. Theory in the study of media violence: The General Aggression Model. In Media Violence and Children; Gentile, D.A., Ed.; Praeger Publishers: Westport, CT, USA, 2003; pp. 87–105. [Google Scholar]
  22. Gentile, D.A.; Gentile, J.R. Learning from Video Games (and Everything Else): The General Learning Model; Cambridge University Press: Cambridge, UK, 2022. [Google Scholar]
  23. Chun, J.; Lee, J.; Kim, J.; Lee, S. An international systemic review of cyberbullying measurements. Comput. Hum. Behav. 2020, 113, 106485. [Google Scholar] [CrossRef]
  24. Mulligan, K.; Scherer, K.R. Toward a working definition of emotion. Emot. Rev. 2012, 4, 345–357. [Google Scholar] [CrossRef]
  25. Barlett, C.P.; Gentile, D.A. Attacking others online: The formation of cyber-bullying in late adolescence. Psychol. Pop. Media Cult. 2012, 1, 130–135. [Google Scholar] [CrossRef]
  26. Shadmanfaat, S.M.; Howell, C.J.; Muniz, C.N.; Cochran, J.K.; Kabiri, S.; Fontaine, E.M. Cyberbullying perpetration: An empirical test of social learning theory in Iran. Deviant Behav. 2020, 41, 278–293. [Google Scholar] [CrossRef]
  27. Legate, N.; Weinstein, N.; Przybylski, A.K. Parenting strategies and adolescents’ cyberbullying behaviors: Evidence from a preregistered study of parent-child dyads. J. Youth Adolesc. 2019, 48, 399–409. [Google Scholar] [CrossRef]
  28. Hinduja, S.; Patchin, J.W. Social influences on cyberbullying behaviors among middle and high school students. J. Youth Adolesc. 2013, 42, 711–722. [Google Scholar] [CrossRef] [PubMed]
  29. Sarmiento, A.; Herrera-López, M.; Zych, I. Is cyberbullying a group process? Online and offline bystanders of cyberbullying act as defenders, reinforcers and outsiders. Comput. Hum. Behav. 2019, 99, 328–334. [Google Scholar] [CrossRef]
  30. Orue, I.; Fernández-González, L.; Machimbarrena, J.M.; González-Cabrera, J.; Calvete, E. Bidirectional relationships between cyberbystanders’ roles, cyberbullying perpetration, and justification of violence. Youth Soc. 2021. [Google Scholar] [CrossRef]
  31. Luo, A.; Bussey, K. Mediating role of moral disengagement in the perpetration of cyberbullying by victims and bystanders. J. Adolesc. 2022, 94, 1142–1149. [Google Scholar] [CrossRef]
  32. Zhao, Y.; Chu, X.; Rong, K. Cyberbullying experience and bystander behavior in cyberbullying incidents: The serial mediating roles of perceived incident severity and empathy. Comput. Hum. Behav. 2023, 138, 107484. [Google Scholar] [CrossRef]
  33. Van Cleemput, K.; Vandebosch, H.; Pabian, S. Personal characteristics and contextual factors that determine “helping,” “joining in”, and “doing nothing” when witnessing cyberbullying. Aggress. Behav. 2014, 40, 383–396. [Google Scholar] [CrossRef]
  34. Bandura, A.; Ross, D.; Ross, S.A. Imitation of film-mediated aggressive models. J. Abnorm. Soc. Psychol. 1963, 66, 3–11. [Google Scholar] [CrossRef]
  35. Bandura, A.; Ross, D.; Ross, S.A. Vicarious reinforcement and imitative learning. J. Abnorm. Soc. Psychol. 1963, 67, 601–607. [Google Scholar] [CrossRef]
  36. Dang, J.; Liu, L. Me and others around: The roles of personal and social norms in chinese adolescent bystanders’ responses toward cyberbullying. J. Interpers. Violence 2022, 37, NP6329–NP6354. [Google Scholar] [CrossRef]
  37. Festl, R.; Scharkow, M.; Quandt, T. The individual or the group: A multilevel analysis of cyberbullying in school classes. Hum. Commun. Res. 2015, 41, 535–556. [Google Scholar] [CrossRef]
  38. Bastiaensens, S.; Pabian, S.; Vandebosch, H.; Poels, K.; Van Cleemput, K.; DeSmet, A.; De Bourdeaudhuij, I. From normative influence to social pressure: How relevant others affect whether bystanders join in cyberbullying. Soc. Dev. 2016, 25, 193–211. [Google Scholar] [CrossRef]
  39. Chen, L.; Ho, S.S.; Lwin, M.O. A meta-analysis of factors predicting cyberbullying perpetration and victimization: From the social cognitive and media effects approach. New Media Soc. 2017, 19, 1194–1213. [Google Scholar] [CrossRef]
  40. Katz, I.; Lemish, D.; Cohen, R.; Arden, A. When parents are inconsistent: Parenting style and adolescents’ involvement in cyberbullying. J. Adolesc. 2019, 74, 1–12. [Google Scholar] [CrossRef]
  41. Moreno–Ruiz, D.; Martínez–Ferrer, B.; García–Bacete, F. Parenting styles, cyberaggression, and cybervictimization among adolescents. Comput. Hum. Behav. 2019, 93, 252–259. [Google Scholar] [CrossRef]
  42. Charalampous, K.; Demetriou, C.; Tricha, L.; Ioannou, M.; Georgiou, S.; Nikiforou, M.; Stavrinides, P. The effect of parental style on bullying and cyber bullying behaviors and the mediating role of peer attachment relationships: A longitudinal study. J. Adolesc. 2018, 64, 109–123. [Google Scholar] [CrossRef]
  43. Barón, J.O.; Postigo, J.; Iranzo, B.; Buelga, S.; Carrascosa, L. Parental communication and feelings of affiliation in adolescent aggressors and victims of cyberbullying. Soc. Sci. 2018, 8, 3. [Google Scholar] [CrossRef]
  44. Larrañaga, E.; Yubero, S.; Ovejero, A.; Navarro, R. Loneliness, parent-child communication and cyberbullying victimization among Spanish youths. Comput. Hum. Behav. 2016, 65, 1–8. [Google Scholar] [CrossRef]
  45. Romero-Abrio, A.; Martínez-Ferrer, B.; Musitu-Ferrer, D.; León-Moreno, C.; Villarreal-González, M.E.; Callejas-Jerónimo, J.E. Family communication problems, psychosocial adjustment and cyberbullying. Int. J. Environ. Res. Public Health 2019, 16, 2417. [Google Scholar] [CrossRef] [PubMed]
  46. Baldry, A.C.; Sorrentino, A.; Farrington, D.P. Cyberbullying and cybervictimization versus parental supervision, monitoring and control of adolescents’ online activities. Child. Youth Serv. Rev. 2019, 96, 302–307. [Google Scholar] [CrossRef]
  47. Meter, D.J.; Bauman, S. Moral disengagement about cyberbullying and parental monitoring: Effects on traditional bullying and victimization via cyberbullying involvement. J. Early Adolesc. 2018, 38, 303–326. [Google Scholar] [CrossRef]
  48. Doty, J.L.; Gower, A.L.; Sieving, R.E.; Plowman, S.L.; McMorris, B.J. Cyberbullying victimization and perpetration, connectedness, and monitoring of online activities: Protection from parental figures. Soc. Sci. 2018, 7, 265. [Google Scholar] [CrossRef]
  49. Pieschl, S.; Porsch, T. The complex relationship between cyberbullying and trust. Int. J. Dev. Sci. 2017, 11, 9–17. [Google Scholar] [CrossRef]
  50. den Hamer, A.H.; Konijn, E.A. Adolescents’ media exposure may increase their cyberbullying behavior: A longitudinal study. J. Adolesc. Health 2015, 56, 203–208. [Google Scholar] [CrossRef]
  51. Fanti, K.A.; Demetriou, A.G.; Hawa, V.V. A longitudinal study of cyberbullying: Examining risk and protective factors. Eur. J. Dev. Psychol. 2012, 9, 168–181. [Google Scholar] [CrossRef]
  52. Bushman, B.J.; Huesmann, L.R. Short-term and long-term effects of violent media on aggression in children and adults. Arch. Pediatr. Adolesc. Med. 2006, 160, 348–352. [Google Scholar] [CrossRef]
  53. Barlett, C.P.; Kowalewski, D.A.; Kramer, S.S.; Helmstetter, K.M. Testing the relationship between media violence exposure and cyberbullying perpetration. Psychol. Pop. Media Cult. 2019, 8, 280–286. [Google Scholar] [CrossRef]
  54. Zhu, X.W.; Chu, X.W.; Zhang, Y.H.; Li, Z.H. Exposure to online game violence and cyberbullying among Chinese adolescents: Normative beliefs about aggression as a mediator and trait aggressiveness as a moderator. J. Aggress. Maltreatment Trauma 2020, 29, 148–166. [Google Scholar] [CrossRef]
  55. James, I.A.; Southam, L.; Blackburn, I.M. Schemas revisited. Clin. Psychol. Psychother. Int. J. Theory Pract. 2004, 11, 369–377. [Google Scholar] [CrossRef]
  56. Huesmann, R.L. An information processing model for the development of aggression. Aggress. Behav. 1988, 14, 13–24. [Google Scholar] [CrossRef]
  57. Wilkowski, B.M.; Robinson, M.D. The cognitive basis of trait anger and reactive aggression: An integrative analysis. Personal. Soc. Psychol. Rev. 2008, 12, 3–21. [Google Scholar] [CrossRef]
  58. Li, M.; He, Q.; Zhao, J.; Xu, Z.; Yang, H. The effects of childhood maltreatment on cyberbullying in college students: The roles of cognitive processes. Acta Psychol. 2022, 226, 103588. [Google Scholar] [CrossRef]
  59. Li, S.; Wang, X.; Nie, Y. The relationship between parent-child attachment, belief in a just world, school climate and cyberbullying: A moderated mediation. Int. J. Environ. Res. Public Health 2022, 19, 6207. [Google Scholar] [CrossRef]
  60. Fan, C.; Chu, X.; Zhang, M.; Zhou, Z. Are narcissists more likely to be involved in cyberbullying? Examining the mediating role of self-esteem. J. Interpers. Violence 2019, 34, 3127–3150. [Google Scholar] [CrossRef]
  61. Greitemeyer, T. Effects of prosocial media on social behavior: When and why does media exposure affect helping and aggression? Curr. Dir. Psychol. Sci. 2011, 20, 251–255. [Google Scholar] [CrossRef]
  62. Barlett, C.P. Predicting Cyberbullying: Research, Theory, and Interventions; Academic Press: San Diego, CA, USA, 2019. [Google Scholar]
  63. Gentile, D.A.; Anderson, C.A.; Yukawa, S.; Ihori, N.; Saleem, M.; Ming, L.K.; Shibuya, A.; Liau, A.K.; Khoo, A.; Bushman, B.J.; et al. The effects of prosocial video games on prosocial behaviors: International evidence from correlational, longitudinal, and experimental studies. Pers. Soc. Psychol. Bull. 2009, 35, 752–763. [Google Scholar] [CrossRef]
  64. Wright, M.F. Predictors of anonymous cyber aggression: The role of adolescents’ beliefs about anonymity, aggression, and the permanency of digital content. Cyberpsychol. Behav. Soc. Netw. 2014, 17, 431–438. [Google Scholar] [CrossRef]
  65. Wright, M.F. The relationship between young adults’ beliefs about anonymity and subsequent cyber aggression. Cyberpsychol. Behav. Soc. Netw. 2013, 16, 858–862. [Google Scholar] [CrossRef]
  66. Sticca, F.; Perren, S. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying. J. Youth Adolesc. 2013, 42, 739–750. [Google Scholar] [CrossRef]
  67. Suler, J. The online disinhibition effect. Cyberpsychol. Behav. 2004, 7, 321–326. [Google Scholar] [CrossRef] [PubMed]
  68. Udris, R. Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale. Comput. Hum. Behav. 2014, 41, 253–261. [Google Scholar] [CrossRef]
  69. Ang, R.P.; Tan, K.; Mansor, A.T. Normative beliefs about aggression as a mediator of narcissistic exploitativeness and cyberbullying. J. Interpers. Violence 2011, 26, 2619–2634. [Google Scholar] [CrossRef]
  70. Ang, R.P.; Li, X.; Seah, S.L. The role of normative beliefs about aggression in the relationship between empathy and cyberbullying. J. Cross-Cult. Psychol. 2017, 48, 1138–1152. [Google Scholar] [CrossRef]
  71. Burton, K.A.; Florell, D.; Wygant, D.B. The role of peer attachment and normative beliefs about aggression on traditional bullying and cyberbullying. Psychol. Sch. 2013, 50, 103–115. [Google Scholar] [CrossRef]
  72. Huesmann, R.L.; Guerra, N.G. Children’s normative beliefs about aggression and aggressive behavior. J. Personal. Soc. Psychol. 1997, 72, 408–419. [Google Scholar] [CrossRef]
  73. Wei, H.; Liu, M. Loving your parents and treating others well: The effect of filial piety on cyberbullying perpetration and its functional mechanism among Chinese graduate students. J. Interpers. Violence 2022, 37, NP8670–NP8695. [Google Scholar] [CrossRef]
  74. Dodge, K.A.; Coie, J.D. Social-information-processing factors in reactive and proactive aggression in children’s peer groups. J. Personal. Soc. Psychol. 1987, 53, 1146–1158. [Google Scholar] [CrossRef]
  75. Lazuras, L.; Barkoukis, V.; Ourda, D.; Tsorbatzoudis, H. A process model of cyberbullying in adolescence. Comput. Hum. Behav. 2013, 29, 881–887. [Google Scholar] [CrossRef]
  76. Kaiser, S.; Kyrrestad, H.; Fossum, S. Cyberbullying status and mental health in Norwegian adolescents. Scand. J. Psychol. 2020, 61, 707–713. [Google Scholar] [CrossRef]
  77. Glasman, L.R.; Albarricin, D. Forming attitudes that predict future behavior: A meta-analysis of the attitude-behavior relation. Psychol. Bull. 2006, 132, 778–822. [Google Scholar] [CrossRef] [PubMed]
  78. Wang, L.; Ngai, S.S. Cyberbullying perpetration among Chinese adolescents: The rol of power imbalance, fun-seeking tendency, and attitude toward cyberbullying. J. Interpers. Violence 2022, 37, NP21647. [Google Scholar] [CrossRef] [PubMed]
  79. Doane, A.N.; Pearson, M.R.; Kelley, M.L. Predictors of cyberbullying perpetration among college students: An application of the Theory of Reasoned Action. Comput. Hum. Behav. 2014, 36, 154–162. [Google Scholar] [CrossRef]
  80. Cavalcanti, J.G.; Pinto, A.V.; Pimentel, C.E.; Fernandes de Melo, L.M. Psychometric parameters of the cyberbullying attitdue scale in Brazil. Curr. Psychol. 2021, 40, 3897–3907. [Google Scholar] [CrossRef]
  81. Heriman, W.; Walrave, M. Predicting adolescent perpetration in cyberbullying: An application of the theory of planned behavior. Psicothema 2012, 24, 614–620. [Google Scholar]
  82. Keum, B.T.; Miller, M.J. Racism on the Internet: Conceptualization and recommendations for research. Psychol. Violence 2018, 8, 782–791. [Google Scholar] [CrossRef]
  83. Ruggiero, T.E. Uses and gratifications theory in the 21st century. Mass Commun. Soc. 2000, 3, 3–37. [Google Scholar] [CrossRef]
  84. Tanrikulu, I.; Erdur-Baker, O. Motives behind cyberbullying perpetration: A test of Uses and Gratifications Theory. J. Interpers. Violence 2021, 36, NP6699–NP6724. [Google Scholar] [CrossRef]
  85. Rule, B.G.; Ferguson, T.J. The effects of media violence on attitudes, emotions, and cognitions. J. Soc. Issues 1986, 42, 29–50. [Google Scholar] [CrossRef]
  86. Pabian, S.; Vandebosch, H.; Poels, K.; Van Cleemput, K.; Bastiaensens, S. Exposure to cyberbullying as a bystander: An investigation of desensitization effects among early adolescents. Comput. Hum. Behav. 2016, 62, 480–487. [Google Scholar] [CrossRef]
  87. Wang, X.; Yang, L.; Yang, J.; Wang, P.; Lei, L. Trait anger and cyberbullying among young adults: A moderated mediation model of moral disengagement and moral identity. Comput. Hum. Behav. 2017, 73, 519–526. [Google Scholar] [CrossRef]
  88. Zhang, D.; Huebner, E.S.; Tian, L. Longitudinal associations among neuroticism, depression, and cyberbullying in early adolescents. Comput. Hum. Behav. 2020, 112, 106475. [Google Scholar] [CrossRef]
  89. Baroncelli, A.; Ciucci, E. Unique effects of different components of trait emotional intelligence in traditional bullying and cyberbullying. J. Adolesc. 2014, 37, 807–815. [Google Scholar] [CrossRef]
  90. Vandebosch, H.; Van Cleemput, K. Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology Behav. 2008, 11, 499–503. [Google Scholar] [CrossRef]
  91. Barlett, C.P.; Chamberlin, K.; Witkower, Z. Predicting cyberbullying perpetration in emerging adults: A test of the Barlett Gentile Cyberbullying Model. Aggress. Behav. 2017, 43, 147–154. [Google Scholar] [CrossRef]
  92. Barlett, C.P.; Helmstetter, K.M. Longitudinal relations between early online disinhibition and anonymity perceptions on later cyberbullying perpetration: A theoretical test on youth. Psychol. Pop. Media Cult. 2018, 7, 561–571. [Google Scholar] [CrossRef]
  93. Barlett, C.P.; Seyfert, L.W.; Simmers, M.M.; Chen, V.H.H.; Cavalcanit, J.G.; Krahe, B.; Suzuke, K.; Warburton, W.A.; Wong, R.Y.M.; Pimentel, C.E.; et al. Cross-cultural similarities and differences in the theoretical predictors of cyberbullying preparation: Results from a seven-country study. Aggress. Behav. 2021, 47, 111–119. [Google Scholar] [CrossRef]
  94. Barlett, C.P.; Gentile, D.A.; Li, D.; Khoo, A. Predicting cyberbullying behavior from attitudes: A three-year cross-lagged analysis of Singaporean youth. J. Media Psychol. 2019, 31, 81–91. [Google Scholar] [CrossRef]
  95. Barlett, C.P.; Kowalewski, D.A. Learning to cyberbully: An extension of the Barlett Gentile Cyberbullying Model. Psychol. Pop. Media Cult. 2019, 8, 437–443. [Google Scholar] [CrossRef]
  96. Barlett, C.; Coyne, S.M. A meta-analysis of sex differences in cyber-bullying behavior: The moderating role of age. Aggress. Behav. 2014, 40, 474–488. [Google Scholar] [CrossRef]
  97. Barlett, C.P.; Seyfert, L.W.; Rinker, A.M.; Roth, B.R. The moderating role of dispositional fear of retaliation in cyberbullying perpetration processes. Personal. Individ. Differ. 2022, 196, 111731. [Google Scholar] [CrossRef]
  98. Barlett, C.P.; Madison, C.S.; Heath, J.B.; DeWitt, C.C. Please browse responsibly: A correlational examination of technology access and time spent online in the Barlett Gentile Cyberbullying Model. Comput. Hum. Behav. 2019, 92, 250–255. [Google Scholar] [CrossRef]
  99. Barlett, C.P.; Roth, B.R.; Rinker, A.M. Muscles, popularity, social capital, and computer skills: Examining “power” in cyberbullying. Aggress. Behav. 2022, 48, 608–615. [Google Scholar] [CrossRef]
  100. Williford, A.; DePaolis, K.J. Predictors of cyberbullying intervention among elementary school staff: The moderating effect of staff status. Psychol. Sch. 2016, 53, 1032–1044. [Google Scholar] [CrossRef]
  101. Cioppa, V.D.; O’Neil, A.; Craig, W. Learning from traditional bullying interventions: A review of research on cyberbullying and best practices. Aggress. Violent Behav. 2015, 23, 61–68. [Google Scholar] [CrossRef]
  102. Barlett, C.P.; Heath, J.B.; Madison, C.S.; DeWitt, C.C.; Kirkpatrick, S.M. You’re not anonymous online: The development and validation of a new cyberbullying intervention curriculum. Psychol. Pop. Media Cult. 2020, 9, 135–144. [Google Scholar] [CrossRef]
  103. Gradinger, P.; Yanagida, T.; Strohmeier, D.; Spiel, C. Prevention of cyberbullying and cybervictimization: Evaluation of the ViSC social competence program. J. Sch. Violence 2015, 14, 87–110. [Google Scholar] [CrossRef]
  104. Williford, A.; Elledge, L.C.; Boulton, A.J.; DePaolis, K.J.; Little, T.D.; Salmivalli, C. Effects of the KiVa antibullying program on cyberbullying and cybervictimization frequency among Finnish youth. J. Clin. Child Adolesc. Psychol. 2013, 42, 820–833. [Google Scholar] [CrossRef]
  105. DeSmet, A.; Bastiaensens, S.; Van Cleemput, K.; Poels, K.; Vandebosch, H.; Deboutte, G.; Herrewijn, L.; Malliet, S.; Pabian, S.; Van Broeckhoven, F.; et al. The efficacy of the Friendly Attac serious digital game to promote prosocial bystander behvaior in cyberbullying among young adolescents: A cluster-randomized controlled trial. Comput. Hum. Behav. 2018, 78, 336–347. [Google Scholar] [CrossRef]
  106. Englander, E. Cell phone ownership and cyberbullying in 8–11 year olds: New research. Pediatrics 2018, 142, 724. [Google Scholar]
  107. Viney, L.L. The assessment of psychological states through content analysis of verbal communications. Psychol. Bull. 1983, 94, 542–563. [Google Scholar] [CrossRef]
  108. Rezvani, N.; Beheshti, A. Towards attention-based context-boosted cyberbullying detection in social media. J. Data Intell. 2021, 2, 418–433. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.