| Literature DB >> 33066202 |
Estefanía Estévez1, Elizabeth Cañas1, Jesús F Estévez1, Amapola Povedano2.
Abstract
The objective of this study was to conduct a systematic review of research focused on analyzing the overlap and continuity of the roles in victims and aggressors of bullying and cyberbullying, as well as the exchange of roles in both harassment dynamics in adolescents. Searches in the main electronic databases for studies published in the last 20 years identified 19 studies that fulfilled inclusion criteria. The findings of the studies analyzed were not homogeneous, however, the main conclusion of all of them, to a greater or lesser extent, was that there is a component of continuity or superposition in the roles of both forms of bullying. Some studies also found an exchange of roles, especially in the case of victims and cybervictims who decide to reprimand their aggressors in an online context, becoming in cyberaggressors too. It is necessary to continue investigating the coexistence of bullying and cyberbullying and its exchange in certain contexts and people, as well as whether they are part of the same phenomenon with a certain continuity, or if cyberbullying is another expression of traditional bullying. Future intervention programs focusing on traditional school bullying could also evaluate their impact in situations of cyberbullying among peers.Entities:
Keywords: bullying; cyberbullying; dual role; overlap; systematic review
Mesh:
Year: 2020 PMID: 33066202 PMCID: PMC7602061 DOI: 10.3390/ijerph17207452
Source DB: PubMed Journal: Int J Environ Res Public Health ISSN: 1660-4601 Impact factor: 3.390
Figure 1Flow chart of the selection process. Exclusion criteria: Context: studies investigating bullying in other contexts; Other abuse: studies investigating other forms of abuse; Not adolescents: studies not involving adolescent participants; Type article: non-quantitative studies or scientific articles; Language: study not written in English or Spanish.
Methodological quality of studies.
| Author/s | Criteria | Total | ||||||
|---|---|---|---|---|---|---|---|---|
| I | II | III | IV * | V * | VI | VII | ||
| Baldry, Farrington, and Sorrentino [ | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 5 |
| Beran and Li [ | 0 | −1 | 0 | 0 | −1 | 1 | 1 | 0 |
| Cuadrado-Gordillo and Fernández-Antelo [ | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 6 |
| Cuadrado-Gordillo, Fernández-Antelo, and Martín-Mora [ | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 6 |
| Del Rey, Elipe, and Ortega [ | 0 | −1 | 1 | −1 | 1 | 1 | 1 | 2 |
| García-Fernández, Romera-Félix, and Ortega-Ruiz [ | 1 | 0 | 1 | −1 | 0 | 1 | 1 | 3 |
| Gradinger, Strohmeier, and Spiel [ | 1 | 1 | 1 | −1 | 1 | 1 | 1 | 5 |
| Juvonen and Gross [ | 0 | 0 | 0 | 1 | 0 | 1 | 1 | 3 |
| Katzer, Fetchenhauer, and Belschak [ | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 6 |
| Khong et al. [ | 1 | 0 | 1 | 1 | 0 | 1 | 1 | 5 |
| Kim, Song, and Jennings [ | −1 | 0 | 0 | 0 | −1 | 1 | 1 | 0 |
| Kubiszewski, Fontaine, Potard, and Auzoult [ | 1 | 0 | 1 | −1 | −1 | 1 | 1 | 2 |
| Lazuras, Barkoukis, and Tsorbatzoudis [ | 1 | 0 | 1 | −1 | −1 | 1 | 1 | 2 |
| Schneider, O’donnell, Stueve, and Coulter [ | 1 | 1 | 1 | −1 | −1 | 1 | 1 | 3 |
| Slonje and Smith [ | 1 | −1 | 0 | −1 | −1 | 1 | 1 | 0 |
| Waasdorp and Bradshaw [ | 1 | 1 | 0 | −1 | −1 | 1 | 1 | 2 |
| Wang et al. [ | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 6 |
| Ybarra, Diener-West, and Leaf [ | 1 | 0 | 0 | 1 | 1 | 1 | 1 | 5 |
| Ybarra and Mitchell [ | 1 | 0 | 0 | −1 | 1 | 1 | 1 | 3 |
Notes: * Own elaboration; I. Randomized Selection of Participants: (1) random selection, (0) nonrandom selection, (−1) no description of the sample selection procedure, (NA) not applicable; II. Sample Size: (1) sample size larger than similar studies, (0) sample size the same as similar studies, (−1) sample size smaller than similar study or sample size not given, (NA) not applicable; III. Operationalization of Concepts: (1) variables have either been previously used in research or are improvements over previous measures, (0) variables have not been used in previous research studies, (−1) variable operationalization is not discussed, (NA) not applicable; * IV. Frequency of Bullying and Cyberbullying: (1) categories are established according to frequency with detailed and validated procedure, (0) categories are assigned according to frequency without specifying the procedure to reach them, (−1) the frequency of harassment and cyberbullying is not taken into account, (NA) not applicable; * V. Descriptive Analysis and Reliability of Instruments: (1) the instruments are described and their reliability index is set, (0) some type of description of the instrument is presented but not the reliability of this one, (−1) the instruments are not described and do not present reliability, (NA) not applicable; VI. Appropriateness of Statistical Techniques: (1) statistical techniques, reasons for choosing technique, and caveats are fully explained, (0) statistical technique is explained, but the reasons for choosing technique or the caveats are not included, (−1) statistical technique, reasons for choosing technique, and caveats are not explained, (NA) not applicable; VII. Omitted Variable Bias: (1) all important explanations are included in the analysis, (0) important explanations are omitted from the analysis, (−1) variables and concepts included in the analysis are not described in sufficient detail to determine whether key alternative explanations have been omitted, (NA) not applicable.
Summary of selected studies.
| Author/s | Characteristics of the Sample | Self-Report Measures and Objectives | Main Findings |
|---|---|---|---|
| Baldry et al. (2016) [ | Different types of bullying and cyberbullying to analyze the overlap between both behaviors. | Bullies were almost five times more likely to become cyberbullies and victims were almost four times more likely to be cybervictims. | |
| Beran and Li (2008) [ | Experience of cyberbullying and bullying to determine whether traditional victims are also cybervictims. | A third of the children of the sample who were bullied in cyberspace were also bullied at school (continuity). | |
| Cuadrado-Gordillo and Fernández-Antelo (2014) [ | Different types of bullying and cyberbullying to identify the role of victim-cyberaggressors and their prevalence. | Victims of bullying in school or virtual environments tended to use the same means to bully their peers, but also they chose to attack their peers through online means (role exchange). | |
| Cuadrado-Gordillo et al. (2019) [ | Different types of bullying and cyberbullying to determine the prevalence of victim-aggressors in both contexts. | Suffering victimization can predict the aggressive response of many of the adolescents due to the anonymity that can be achieved by using technological and virtual resources (role exchange). | |
| Del Rey et al. (2012) [ | Experience of cyberbullying and bullying in two different time periods to analyze the homogeneity or exchange between the roles of both harassment dynamics. | Bullying participation helped to predict cyberbullying participation. | |
| García-Fernández et al. (2015) [ | Experience of cyberbullying and bullying during the last 3 months to study the overlap between both behaviors. | Being involved in cyberbullying problems seems to be a factor related to involvement in traditional bullying problems. | |
| Gradinger et al. (2009) [ | Different types of (cyber)bullying and (cyber)victimization to investigate the co-occurrence of these behaviors. | Hardly any students were exclusively cybervictims, with most of them being traditional victims at the same time. | |
| Juvonen and Gross (2008) [ | Experience of cyberbullying and bullying and assumptions about cyberbullying to examine the overlap and the similarities between online and traditional bullying among Internet-using adolescents. | Being bullied in school could be a risk factor for being bullied online (continuity). | |
| Katzer et al. (2009) [ | Experience of cyberbullying and bullying to determine the differences or similarities in the predictors of both harassment dynamics. | Traditional victims also tended to be cybervictimized (continuity). | |
| Khong et al. (2020) [ | Experience of cybervictimization and victimization to examine the co-occurrence of both dynamics. | Victims of bullying were almost 11 times more likely to be cybervictims, compared to those who had not experienced school bullying (continuity). | |
| Kim et al. (2017) [ | Experience of cyberbullying and bullying during the last year to study the differences and similarities between both harassments. | Bullying increased the risk of being a cyberbully and vice versa. | |
| Kubiszewski et al. (2015) [ | Experience of cyberbullying/victimization and bullying/victimization during the last 2–3 months to study the overlap of these dynamics. | The fourth part of the students kept the same role in both harassments (little overlap). | |
| Lazuras et al. (2017) [ | Experience of cyberbullying and bullying during the last 2 months to examine the overlap between both forms of harassment. | Bullies tended to harass in cyberspace also and traditional victims were more likely to become cybervictims (continuity). | |
| Schneider et al. (2012) [ | Experience of cyberbullying/victimization and bullying/victimization in the last 12 months to examine the degree of overlap between these behaviors. | Almost two-thirds of all cybervictims reported that they were also harassed at school and, conversely, more than a third of victims reported that they were also harassed in cyberspace (continuity). | |
| Slonje and Smith (2008) [ | Experience of cyberbullying and bullying during the last 2–3 months to determine whether cyberbullying is a subtype of bullying. | A small percentage of traditional victims reported cyberbullying others (role exchange). | |
| Waasdorp and Bradshaw (2015) [ | Different types of bullying and experience of cyberbullying in the past 3 months to examine the overlap between bullying and cyberbullying. | More than half of the victims were also cybervictims. | |
| Wang et al. (2019) [ | Experience of cyberbullying/victimization and bullying/victimization to investigate the correlates among these profiles. | A third of adolescents were traditional bully-victims and almost a third of adolescent were cyberbully-victims. | |
| Ybarra et al. (2007) [ | Experience of cyberbullying/victimization to know whether cyberbullying is an extension of bullying. | A third of the cybervictims were also victims at school (continuity). | |
| Ybarra and Mitchell (2004) [ | Experience of cybervictimization and victimization simultaneously in the last year to expand knowledge about both roles. | Half of the cyber-victims and cyber-aggressors were also victims and traditional aggressors, respectively. |