Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and retaliation as a motive to engage in acts of cyberbullying has not yet been examined systematically. As a first step, this study investigates whether and to what extent traditional victims, when they become cyberbullies, actually choose their former (traditional) perpetrators as targets of their own cyberbullying behavior. Furthermore, the impact of individual differences in relevant traits, such as vengefulness and justice sensitivity, on the choice of cybervictims is examined. Data from 473 students were collected via an online survey. Of these...
The overall aim of this study was to examine bystander behavior in cyberbullying situations. The na...
Understanding the motivation of students who cyberbully is important for both prevention and interve...
The present study tested how exposure to two types of responses to a hypothetical simulated Facebook...
Drawing from Uses and Gratifications Theory (UGT), this study explored the interplay between persona...
Empirical thesis.Bibliography: leaves 69-80.1. Introduction -- 2. Method -- 3. Results -- 4. Discuss...
Do victims of bullying tend to be also cyber bullies? Do cyber bullies lack empathic responsiveness?...
to the increase in the use of technological devices, bullying has changed to include a newer form ca...
The growth of the research body surrounding the aggressive use of personal technologies, including b...
Abstract: Research is accumulating to confirm adverse consequences of cyberbullying. Less is known a...
Using a subsample of the 2009 National Crime Victimization Survey, School Crime Supplement (NCVS-SCS...
Cyberbullying is a recent phenomenon, internationally studied over very recent years, that implies i...
Bystanders play a key role in understanding the phenomenon of cyberbullying (CB). The main aim of th...
While cyberbullying research has grown exponentially in the past decade, little attention has been p...
This article investigates the perceptions of 156 students who were victims of both traditional and c...
Background: Cyberbullying refers to an indirect and covert form of aggression, carried out through t...
The overall aim of this study was to examine bystander behavior in cyberbullying situations. The na...
Understanding the motivation of students who cyberbully is important for both prevention and interve...
The present study tested how exposure to two types of responses to a hypothetical simulated Facebook...
Drawing from Uses and Gratifications Theory (UGT), this study explored the interplay between persona...
Empirical thesis.Bibliography: leaves 69-80.1. Introduction -- 2. Method -- 3. Results -- 4. Discuss...
Do victims of bullying tend to be also cyber bullies? Do cyber bullies lack empathic responsiveness?...
to the increase in the use of technological devices, bullying has changed to include a newer form ca...
The growth of the research body surrounding the aggressive use of personal technologies, including b...
Abstract: Research is accumulating to confirm adverse consequences of cyberbullying. Less is known a...
Using a subsample of the 2009 National Crime Victimization Survey, School Crime Supplement (NCVS-SCS...
Cyberbullying is a recent phenomenon, internationally studied over very recent years, that implies i...
Bystanders play a key role in understanding the phenomenon of cyberbullying (CB). The main aim of th...
While cyberbullying research has grown exponentially in the past decade, little attention has been p...
This article investigates the perceptions of 156 students who were victims of both traditional and c...
Background: Cyberbullying refers to an indirect and covert form of aggression, carried out through t...
The overall aim of this study was to examine bystander behavior in cyberbullying situations. The na...
Understanding the motivation of students who cyberbully is important for both prevention and interve...
The present study tested how exposure to two types of responses to a hypothetical simulated Facebook...