Literature DB >> 34159506

A Systematic Review and Meta-analysis of Interventions to Decrease Cyberbullying Perpetration and Victimization.

Joshua R Polanin1, Dorothy L Espelage2, Jennifer K Grotpeter3, Katherine Ingram2, Laura Michaelson4, Elizabeth Spinney3, Alberto Valido2, America El Sheikh5, Cagil Torgal5, Luz Robinson5.   

Abstract

Evidence suggests that cyberbullying among school-age children is related to problem behaviors and other adverse school performance constructs. As a result, numerous school-based programs have been developed and implemented to decrease cyberbullying perpetration and victimization. Given the extensive literature and variation in program effectiveness, we conducted a comprehensive systematic review and meta-analysis of programs to decrease cyberbullying perpetration and victimization. Our review included published and unpublished literature, utilized modern, transparent, and reproducible methods, and examined confirmatory and exploratory moderating factors. A total of 50 studies and 320 effect sizes spanning 45,371 participants met the review protocol criteria. Results indicated that programs significantly reduced cyberbullying perpetration (g = -0.18, SE = 0.05, 95% CI [-0.28, -0.09]) and victimization (g = -0.13, SE = 0.04, 95% CI [-0.21, -0.05]). Moderator analyses, however, yielded only a few statistically significant findings. We interpret these findings and provide implications for future cyberbullying prevention policy and practice.
© 2021. Society for Prevention Research.

Entities:  

Mesh:

Year:  2021        PMID: 34159506      PMCID: PMC8218972          DOI: 10.1007/s11121-021-01259-y

Source DB:  PubMed          Journal:  Prev Sci        ISSN: 1389-4986


Introduction

Prior to the pandemic caused by COVID-19, survey research indicated that 93% of teens aged 13–17 had Internet access and 91% reported accessing online content from a mobile device (Lenhart et al., 2015). It is not surprising then, given the access to information and communication technology, that in the same survey, 4 out of 5 teens reported using the Internet “almost constantly” or “several times a day.” Throughout the pandemic, and once the pandemic subsides, youth and teens will continue to use technology on a regular basis for school, extracurricular activities, and to engage with friends. One of the unfortunate consequences of pervasive and prolonged use of technology is the cyberbullying phenomenon. Cyberbullying perpetration is the act of inflicting or receiving negative, damaging, or abusive language or harassment through information and communications technology (Pearce et al., 2011). A victim of cyberbullying may be intentionally excluded from information sharing, online interactions or in-person interactions shared online, have their passwords or personal information stolen, or receive harassment or threatening messages in multiplayer gaming rooms (Bauman, 2015). The most common cyberbullying definition includes aspects from traditional bullying: repetition, power imbalance, and intention to harm (Hinduja & Patchin, 2008; Nocentini et al., 2010). Participant roles in traditional bullying and cyberbullying are similar; they include bullies, victims, and several different types of bystanders ranging from passive to active (Salmivalli, 2014). The sometimes anonymous nature of cyberbullying enables perpetrators to feel more comfortable bullying someone they perceive to be equally as strong or stronger than them (Vandebosch & Van Cleemput, 2008). Cyberbullying occurs on several information and communication technology platforms, including but not limited to text messages, email, instant messages, chatrooms, public or private social media platforms (e.g., Facebook, Twitter, Snapchat, Instagram, TikTok), or videos through YouTube or other platforms (Whittaker & Kowalski, 2015). Cyberbullying can also occur at any time of day in a wide variety of locations (Wong-Lo et al., 2011), which may make it more pervasive than traditional bullying because it is limited to in-person contexts. Not surprisingly, then, traditional bullying victimization is also highly correlated with cyberbullying victimization (Espelage et al., 2013a, 2013b). Over the past decade, prevalence rates for cyberbullying involvement among youth between the ages of 10 and 17 years (as a victim, bully, or bully/victim) have been reported between 14 and 21% (Kowalski & Limber, 2007; Wang et al., 2009; Ybarra & Mitchell, 2004). The most recent National Center for Education Statistics (NCES) report from the School Crime Supplement to the National Crime Victimization Survey in 2017 estimated that 15% of students ages 12 through 18 were victims of cyberbullying during the 2016–2017 school year (Zhang et al., 2019). Meta-analytic findings revealed that approximately 15% of US students reported being the victim or perpetrator of cyberbullying in the past 30 days (Modecki et al., 2014). Prevalence rates vary widely in other countries, from a low of 5.0% in Australia to a high of 23.8% in Canada (Brochado et al., 2017). A recent small-scale survey further suggests cyberbullying perpetration and victimization may have increased following the pandemic, perhaps as a result of students’ increased technology use (Jain et al., 2020). Evidence suggests that cyberbullying involvement is associated with several negative outcomes including problem behavior (e.g., substance use, peer aggression), as well as school performance, attachment, and satisfaction (Arslan et al., 2012; Kowalski & Limber, 2013; Marciano et al., 2020; Schneider, 2012). More specifically, victims of cyberbullying have been shown to suffer from anxiety more often, and demonstrate lower academic achievement (Kowalski & Limber, 2013; Marciano et al., 2020; Schneider et al., 2012) than those not victimized. Several longitudinal studies observed a statistically significant relation between cyberbullying victimization and later depressive symptoms (Gámez-Guadix et al., 2013; Hemphill et al., 2015; Landoll et al., 2015). Accordingly, victims of cyberbullying have been found to be more likely to report suicidal ideation when compared to their non-involved counterparts (Hinduja & Patchin, 2010). Similarly, perpetrators of cyberbullying have been shown to use drugs and alcohol more regularly, suffer from depression more often, report more suicidal ideation, have lower self-esteem, and demonstrate lower academic achievement, compared with students who are not involved in cyberbullying (Hinduja & Patchin, 2010; Kowalski & Limber, 2013; Kowalski et al., 2014; Marciano et al., 2020). These associations between cyberbullying involvement as a victim or a perpetrator and negative outcomes have also been supported by findings from meta-analyses (Guo, 2016; Kowalski et al., 2014; Marciano et al., 2020). In a recent meta-analytic review of 56 longitudinal studies, Marciano and colleagues (2020) investigated predictors and consequences of cyberbullying perpetration and victimization. Findings of their meta-analysis demonstrated a positive relation between involvement in cyberbullying as a perpetrator or as a victim and internalizing and externalizing outcomes. Researchers, practitioners, and policymakers have attempted to reduce such acts through school-based interventions (Mishna et al., 2011). These behaviors are a global concern, and researchers from Europe, Serbia, Australia, Korea, Taiwan, and China have also studied prevention efforts on cyberbullying in their countries (Aricak et al., 2008; Bhat, 2008; Cassidy et al., 2013; Del Rey et al., 2015; Huang & Chou, 2010; Ortega et al., 2012a, 2012b; Popović-Ćitić et al., 2011; Yang et al., 2013; Yilmaz, 2011; Zhou et al., 2013). Existing interventions either specifically target cyberbullying or generally address it in bullying or school violence prevention programs. Given the emerging evidence, researchers have attempted to synthesize the available literature on the efficacy of anti-cyberbullying programs. The existing reviews differ from this current review by being out of date (Mishna et al., 2011), failing to conduct moderator analyses and investigate programming components (Van Cleemput et al., 2014), or lacking the use of modern meta-analytic techniques (Gaffney et al., 2019a). In addition, several researchers have conducted reviews related to the effects of cyberbullying programs, but these reviews synthesized correlation or prevalence effect sizes and therefore do not provide evidence of program effectiveness (Chen et al., 2017; Gardella et al., 2017; Guo, 2016; Marciano et al., 2020; Modecki et al., 2014; Zych et al., 2015). Given the wide-ranging and pervasive problems caused by cyberbullying, the extensive resources devoted to it, and the lack of a comprehensive and up-to-date review of programming to prevent it, the purpose of this study was to conduct a systematic review and meta-analysis that synthesized the effects of school-based programs on cyberbullying perpetration or victimization outcomes. We conducted an extensive literature search, utilized reliable screening protocols, data extraction procedures, effect size estimation, and modern meta-analytic modeling techniques such as random-effects modeling with robust variance estimation. We also performed confirmatory moderator analyses, in addition to exploratory multiple predictor meta-regression analyses, to investigate how sample, measurement, and program characteristics moderate program effectiveness. A supplementary goal was to advance the field of meta-analysis, and as such, we prepared and made our data and statistical code publicly available which allows for complete reproducibility of study findings. We conclude this manuscript with recommendations for applying these results to school policy as well as future meta-analytic endeavors.

Methods

Prior to conducting the meta-analysis, we created a review protocol that articulated the inclusion/exclusion criteria, search strategy, screening procedures, data extraction codebook, and pre-analysis plan. When writing the protocol, we adhered to well-established standards and reporting guidelines outlined in the Campbell Collaboration’s Methodological Expectations of Campbell Collaboration Intervention Reviews checklist. We pre-registered the protocol and pre-analysis plan on the Open Science Framework (OSF) [https://osf.io/dzn2p/]. To meet to the highest possible reproducibility standards (Polanin et al., 2020), we also published the extracted and analytical datasets as well as the accompanying statistical R code to our OSF page. The published R code allows users to transform the raw dataset into the analytical dataset; reproduce all models conducted for the analysis; reproduce all results, tables, and figures presented in the main text; and reproduce all exploratory analyses and supplemental findings. To efficiently warehouse all extracted information, we constructed a relational database using FileMaker Pro (Apple Inc., 2016). We stored data collected at each phase of the project (i.e., search, screening, data extraction, and effect size estimation), to organize the results and maintain a fully reproducible PRISMA flowchart. The result of this data management was a spreadsheet documenting if and when we screened out a citation. We used the R package PRISMAstatement to create the reproducible flowchart (Wasey, 2019). We also used the R packages metafor (Viechtbauer, 2010), clubSandwich, and tidyverse (Wickham et al., 2019) to clean and pre-process data, run meta-analytic and meta-regression models, and create tables and plots.

Inclusion/Exclusion Criteria

Primary research studies were selected based on the following inclusion and exclusion criteria. Studies must have included only students in K-12 settings. Studies also must have tested the effects of an intervention on cyberbullying. We did not exclude studies based on the type of intervention tested—meaning, we included studies of interventions specifically intended to reduce cyberbullying perpetration and victimization while also including any school-based social interventions such as general violence prevention programs. We included studies that randomly assigned participants to conditions and studies that did not randomly assign participants. Studies included may have assigned participants, classrooms, schools, or school districts to conditions. Although the interventions in included studies did not need to target cyberbullying directly, studies must have measured a cyberbullying perpetration or victimization outcome variable to be included in the review. We also coded bullying-related outcomes for analysis, regardless of whether they were cyber-specific; that is, we coded traditional, in-person bullying perpetration or victimization outcome measures when available. Two related rationales guided the inclusion of traditional in-person bullying. Recent meta-analytic research indicated that traditional in-person bullying perpetration and victimization and cyberbullying perpetration and victimization are correlated (Marciano et al., 2020). We therefore sought to test for differences in program impacts across related but conceptually difference outcome domains. In addition, our original proposal and review protocol called for the extraction of these outcomes. Because the terms cyberbullying, internet bullying, and computer bullying first appeared in the literature in the mid-1990s, we included any study published on or after 1995. We included all types of study reports, published or unpublished, to ensure that every available study report was included in the review and decrease the well-known upward bias of studies published in peer-reviewed journals (Polanin et al., 2016). Studies must have been published in English, Spanish, or Turkish. We chose these languages because members of our team spoke these languages fluently. We did not exclude studies based on country of origin (i.e., we included all studies, regardless of where a study’s sample was drawn).

Literature Search

We conducted several complementary search procedures to ensure a comprehensive review. We first performed an electronic bibliographic search of the literature, searching the following online databases, which included both published and unpublished studies: Academic Search Complete, Education Full Text, ERIC, National Criminal Justice Reference Service Abstracts, ProQuest Criminal Justice, ProQuest Dissertations and Theses, ProQuest Education Journals, ProQuest Social Science Journals, PsycINFO, PubMed (Medline), and Social Sciences Abstracts, CrimDoc, Grey Literature Database (Canadian), Social Care Online (UK), and the Social Science Research Network eLibrary. The search string was tailored to the requirements of each database. We conducted two rounds of electronic database searching, one on April 23, 2018, and a follow-up to capture additional materials from the previous year on Aug. 5, 2019. An example set of search terms and search string are included in the Supplemental Appendix. We also conducted auxiliary searches to attempt to find all available studies. We manually searched Prevention Science, Child Development, and Aggressive Behavior, from 1995 through 2018, because the journals produced a considerable number of studies on school violence, bullying, and cyberbullying. We also hand-searched the Journal of Interpersonal Violence and Computers in Human Behavior because these journals had yielded the largest number of screened-in abstracts. We conducted backward and forward reference harvesting of all included studies. We implemented several author query processes as well. If the study authors evaluated a general violence or bullying prevention program, for example, but did not include a cyberbullying measure, we queried the primary study author and asked whether cyberbullying was measured and not reported. In addition to these direct author queries, we identified general violence prevention studies that may have collected, but did not report, an eligible outcome measure. Polanin and colleagues (2020) articulated this process and the rationale for conducting such a procedure. We emailed 600 primary authors asking for cyberbullying outcome data; 75 authors responded to our request. After reviewing authors’ responses, we added three studies that would have otherwise not been included for a total of 50 studies.

Screening

The large number of citations identified in the screening round required the use of the best practice abstract screening methods articulated in Polanin and colleagues (2019). We developed an abstract screening tool and screened the abstracts using the free Abstrackr software (Wallace et al., 2012)—an open-source, web-based tool. All review team members screened abstracts, including the principal and co–principal investigator, the research coordinator, graduate and undergraduate research assistants, and professional research assistants (10 individuals in total). We attempted to retrieve the full-text PDFs for all citations that were marked as eligible. For all full-text PDFs retrieved, we conducted full-text screening procedures. We developed a full-text screening tool, using the previously described inclusion/exclusion criteria to guide this process. As with abstract screening, screeners received extensive training led by the first author, and pilot screening was conducted. The accuracy of the screening process was ensured as all final decisions were validated by senior review team members.

Data Extraction

A data extraction codebook detailed all information extracted from each study. We extracted study-level information (e.g., details on the sample demographics and how the individuals were placed in groups), characteristics of the intervention and comparison conditions (e.g., who developed or implemented the intervention; implementation fidelity), construct-level information (e.g., scale, reliability, and timing of measurements), and summary data that could be used to estimate effect sizes (e.g., means and standard deviations for the intervention and comparison conditions). We also captured information about study design quality using the What Works Clearinghouse (WWC) Standards and Procedures Handbooks, version 4.1 rating system (What Works Clearinghouse, 2020). All included studies were eligible to receive one of three WWC ratings: meets WWC standards without reservations (highest), meets WWC standards with reservation (medium), and does not meet WWC standards (lowest). Finally, based on the extraction of core intervention components, we grouped similar components together into intervention categories and reported how many interventions used the various core component categories.

Data Handling and Effect Size Estimation

We exported each study’s extracted data from FileMaker into R. In R, we recoded and cleaned all analytical variables (see “01_clean_data.R” for details). We estimated all effect sizes using metafor (Viechtbauer, 2010). Most outcome data were continuous, and we therefore estimated a standardized mean-difference adjusting for small-sample bias, commonly referred to as Hedges’ g (Hedges, 1981). Whenever possible, we accounted for possible selection bias due to pretest differences between conditions using a difference-in-difference effect size estimation procedure as outlined by the What Works Clearinghouse (WWC) version 4.1 Procedures Handbook (pg. E-5, WWC, 2020). We estimated the log odds ratio for any dichotomous outcome but then transformed it into Hedges’ g using the equations suggested by the WWC (pg. E-7). When study authors assigned clusters but did not account for the clustering of students within higher-level groups such as classrooms or schools, we estimated the effective sample size, which adjusts the analytic sample size in a manner that is equivalent to conducting a multilevel model (Higgins et al., 2020). We handled missing data using the “infer, initiate, impute” method suggested by Pigott and Polanin (2020). We first sought to limit missingness by inferring data based on the information provided. One example is the participants’ average age. Some of the studies, for example, provided the exact average age, while other studies only provided the grades sampled. When the exact average was not available, we used the average age at those grade levels to infer the average for the study. Failing this method, we next initiated contact with the primary study author, sending an email directly to the author for the missing information. A very high proportion of study authors returned our request: of the 14 emails sent, 12 responded with at least some of the information requested (86%). As a last step, failing the infer or initiate stage, we sought to multiply impute the remaining missing information. Five potential moderators had missingness: percent of males (6% of studies had missingness), school setting (38%), school type (32%), socioeconomic status (36%), and outcome reliability (52%). We conducted multi-level multiple imputation, assuming a two-level model and a normal distribution (i.e., “2 l.glm.norm” function) using the mice R package (van Buuren, 2020). Our imputation model contained all variables with missingness along with 11 additional variables including condition type, effect size type, and effect size (see Supplemental Material for complete list of variables). The package estimated 5 complete datasets with a maximum iteration of 30 for each; visual inspection of the summary statistics at the iteration end points indicated sufficient convergence. We conducted sensitivity analyses, by using listwise deletion, to ensure results were robust to imputation methodology.

Meta-analysis Methods

First, we conducted separate meta-analytic models to estimate average effects of programs on cyberbullying perpetration, cyberbullying victimization, bullying perpetration, and bullying victimization. We used a multilevel, random-effects model with robust variance estimation (Hedges et al., 2010) to produce a weighted average of the effect sizes. Effect sizes were weighted inversely according to their variances and covariances as implied by the multilevel model. We used this specification to account for non-independent sampling errors due to the inclusion of multiple effect sizes from the same study (Moeyaert et al., 2017). We translated the overall average effects into the probability of positive impact (PPI), a relatively new metric defined by Mathur and VanderWeele (2020). The metric estimated the proportion of true effects above a null result; in other words, it provided the probability that a randomly selected and implemented program would reduce cyberbullying perpetration or victimization. Given substantial effect size heterogeneity, we also conducted exploratory and confirmatory moderator analyses. Our analysis plan articulated six substantive moderators of interest; for these six moderators, we implemented six separate meta-regression models, performing ANOVA-like moderator analyses for the categorical variables and single-variable meta-regression models for the continuous variables. The six moderators of interest were as follows: country of origin (USA vs. non-USA), whether the program targeted cyberbullying (yes vs. no), measurement timepoint (immediate posttest vs. follow-up), original effect size type (continuous vs. dichotomous), percent of males in the sample, and percent of students identifying as nonwhite in the sample. We conducted two types of exploratory models. The first set of exploratory analyses examined two moderators of substantive interest: (1) risk of bias using the WWC’s rating system and (2) presence of one of the seven program categories. We opted to use ANOVA-like moderator analyses because of the variables’ substantive importance. The second set of exploratory analyses implemented meta-regression models with 26 variables for each of the four outcome bins. We grouped these exploratory moderators into 4 thematic categories, running one meta-regression model at a time, resulting in 4 different sets of models. Any statistically significant moderator was kept and added to a final, combined model. We should note that the meta-regression models may suffer from low statistical power and the results should be interpreted with some caution. To ensure the models’ results were robust to potential sources of bias, we also conducted publication bias and sensitivity analyses. We tested for effect size differences between published and unpublished studies in our meta-regression models. We implemented Duval and Tweedie’s (2000) trim and fill method, both at the effect size level and aggregated to a single effect size per study at the study-level. We also controlled for effect size dependency by implementing Egger’s regression test using robust variance estimation as suggested by Rodgers and Pustejovsky (2019). Additional sensitivity analyses were conducted to assess the robustness of our findings to multiple imputation and potential risk of bias due to pretest differences between conditions in the included studies. To this end, we list-wise deleted effect sizes from studies with missing data and re-estimated the confirmatory moderator models to compare against the original models with imputed data. We also included baseline equivalence testing as a meta-regression moderator to see whether findings differed depending on whether studies did or did not test for pretest imbalance (and if they did test, whether or not they found pretest differences between conditions).

Results

Cyberbullying Prevention and Intervention Programming

Programming to decrease cyberbullying perpetration and victimization takes various forms and includes numerous core components. To organize and synthesize the components of programs from studies included in our review, we extracted programming information from each study and grouped related components into seven categories (Supplemental Table S1). The categories do not represent mutually exclusive programming types. Instead, they represent groupings of similar programming components. An individual program could use multiple components and therefore be represented within multiple categories. We defined the seven programming categories as follows: (1) skill-building, (2) curricula and prepared materials, (3) psychoeducation, (4) multimedia materials, (5) training, (6) school climate or school policy, and (7) group or individual targeted responses. Supplemental Table 1 delineates the components that constitute each category. Components were considered to be included as part of a program if referenced as part of the program description. We visualized the usage of each category by plotting the frequency of each category (Fig. 1). Nearly 80% of the programs included some form of skill building, and many others used curricula or other pre-packaged materials (67%) or multimedia materials (65%). We describe programs within each component category below.
Fig. 1

Program component categories

Summary characteristics of included studies Studies (effect sizes) Participants (M, SD) 50 (320) 45,371 (1600, 4624) Study-level summary statistics presented NR-Cls non-random assignment at the classroom level, NR-Ind non-random assignment at the individual level, NR-Sclnon-random assignment at the school level, R-Cls random assignment at the classroom level, R-Ind random assignment at the individual level, MSWoR meets WWC standards without reservation, MSWR meets standards with reservation, DNMS does not meet WWC standards Program component categories

Skill-Building

Skill-building broadly refers to teaching or training students to develop a competency that they can apply independently when appropriate in real-time. The relevance of skill-building to cyberbullying prevention is paramount: Students must learn how to respond safely and appropriately when or after they are in situations that give rise to cyberbullying, especially given that adults or other peers are likely not present during those interactions (Mishna et al., 2009). Among programs that aim to increase skill-building, training delivery modality varies widely. Some programs like Skills for Life (Fekkes et al., 2016) and Relationships to Grow (Guarini et al., 2019) use tools such as role-play exercises, video and live demonstrative modeling, vignette discussion, and feedback embedded in a greater curriculum. NoTrap! is an example of a peer-led program that provides peer leaders with training on communication skills with regard to communicating awareness-raising messaging to peers and modeling bullying conflict management and coping (Palladino et al., 2016).

Curricula and Prepared Materials

The curricula and prepared materials category refers broadly to uniform, prepared, content that guides the delivery of the intervention by teachers, counselors, school staff, and sometimes students’ family members. Programs may train students to deliver content. Two examples of programs included in this category are WebQuest (Lee et al., 2013) and PREDEMA (Programa de Educación Emocional para Adolescentes or Program of Emotional Education for Adolescents; Taylor et al., 2017). WebQuest is an online curriculum that is composed of eight 45-min sessions (Lee et al., 2013). The program is delivered as a series of interactive “missions” that students must solve together in small teams regarding the dangers of cyberbullying. Additionally, the curriculum includes access to resources for students to reference on their own as needed. PREDEMA is a type of curriculum that teaches social-emotional learning skills, or the constellation of competencies that encourage self-regulation and bringing awareness to interactions with others (Taylor et al., 2017). The program seeks to improve social-emotional skills to enhance the quality of students’ interpersonal relationships. Curricula identified in this review also included workbooks, homework, and other material designed to help students engage with the material. The Cyberbullying Prevention Program is an 8-week curriculum that was a hybrid of psychoeducation and social-emotional skill building. Students complete weekly homework assignments that focuses on self-reflection in the context of the material covered in class. Reference materials are distributed to parents on the content of the students’ curriculum and information on how to support them. The ConRed program is similar, but also incorporates family and staff training (Del Rey et al., 2016). All training sessions (i.e., student, teacher, and parent) utilize quizzes on the material during class in addition to debates and discussions.

Psychoeducation

The term psychoeducation emerged from the mental health field and is defined as a form of intervention focused on developing awareness, understanding, and effective coping strategies to manage an illness (Lukens & McFarlane, 2004). Psychoeducational programs are centered on the premise that participants’ increases in knowledge about a condition will lead them to improved condition-related outcomes (Lukens & McFarlane, 2004). In cyberbullying prevention, programs with a psychoeducational component are aimed at raising awareness of cyberbullying and increasing participants’ knowledge of cyber-safety and strategies to avoid or combat cyberbullying. The ViSC (Viennese Social Competence) program employs a psychoeducational approach by implementing a “train the trainer cascade” where scientists train “multipliers,” and “multipliers” train teachers about how to recognize bullying cases, how to tackle acute cases, and how to implement prevention strategies in the school (Gradinger et al., 2015). Educators are also trained to review school policies about cyberbullying and provide parents and students with cyberbullying related training. The students then train in social competence skills to create a positive school environment in which bullying/cyberbullying will be less likely to occur (Gradinger et al., 2015). The Cyber Friendly Schools program is a psychoeducational program (Cross et al., 2016). Rather than eradicate the use of these technologies at school, the program focuses on educating youth about the potential risks associated with being online, and strategies to increase online safety (Cross et al., 2016). The program motivates students to reflect on their rights and responsibilities online and included modules about the nature and prevalence of cyberbullying, safety in social networks, positive cyber-relations or “netiquette,” managing online privacy, and legal issues associated with reporting, among other topics (Cross et al., 2016).

Media Materials

The creative use of media materials in cyberbullying prevention programs is designed to enhance student engagement and participation, which may translate to effective prevention results. Several programs employ video technology to deliver prevention curricula, and their use can be an effective way to deliver content and demonstrate skills on a large scale while keeping costs of implementation low. One example of a study using video to deliver prevention curriculum is the Second Step program (Espelage et al., 2015a, 2015b). The Second Step lessons are accompanied and supported by a media-rich DVD which included interviews with students and demonstrations of skills. The videos reinforce skill acquisition during the program delivery which supported other prevention strategies (Espelage et al., 2015a, 2015b). Ingram and colleagues (2019) leveraged the use of virtual reality technology to deliver interactive prevention content to middle school students. The use of virtual reality is designed to provide an immersive experience that enables students to decrease their sense of psychological distance from displayed scenarios and enhance intervention messaging effectiveness. Finally, some cyberbullying programs employ online or web-based instruction to deliver content and create interactive experiences for students that extended beyond the classroom. The Italian program Noncadiamointrappola (Let’s not fall into a trap; Menesini et al., 2012) is a web-based instruction forum in which online educators post discussion threads, answer questions, and moderate conversations with students (Menesini et al., 2012). Four online instructors alternate the control of the forum for a period of 2 weeks each, which is also supplemented by face-to-face instruction.

Training

Providing participants in any intervention program with the knowledge, skills, and practice they need to accomplish a specific goal is a widely accepted best practice (Nation et al., 2003). Several cyberbullying interventions include a training component, though they differ somewhat on the skills they targeted. The Tabby Improved Prevention and Intervention Program (TIPIP) includes both teacher and student training components (Sorrentino et al., 2018). In this program, the developers train teachers across four sessions on ways to recognize, prevent, and manage cyberbullying among their students. The developers also train students in four sessions on how to recognize and avoid becoming involved in risky online behaviors including cyberbullying (Sorrentino et al., 2018). Additionally, several programs include a parental training component that focuses on providing parents with skills to support their children in navigating cyberbullying (e.g., Cross et al., 2016; Del Rey et al., 2016; Wölfer et al., 2014).

School Climate or School Policy

School climate refers to a summation of individuals’ (often students’) perceptions of the educational structures, values, practices, and relationships that create their school experiences (Thapa et al., 2013). The Olweus Bullying Prevention Program (OBPP) proposes a logic model where bullying is reduced through strengthening components of school climate (Olweus, 1991; Olweus & Limber, 2010a, 2010b). This program is the oldest, arguably most researched, anti-bullying program, developed in Norway in the mid-1980s. To address the goals of reducing existing bullying, preventing new bullying, and improving general peer relations, program school personnel work to restructure the school environment to build a sense of community that reduces opportunities and rewards for bullying (Olweus et al., 2019). The multi-level program, composed of community-level, whole school-level, classroom-level, and individual-level components, targeted reducing bullying in general, but did not target cyberbullying in particular. Similarly, the Restorative Practices Intervention, developed in 1999 by the International Institute for Restorative Practices and evaluated by Acosta and colleagues (2019), trains all school staff to develop a supportive school environment through 11 restorative practices (“Essential Elements”). These programming elements range along an informal to formal continuum, such as using affective statements to communicate feelings, holding restorative “circles” or “conferences,” and using restorative practices during interactions with family members (Acosta et al., 2019). Like the OBPP, the Restorative Practices Intervention does not describe specific components that target cyberbullying, but instead aims to reduce general negative interactions through building a supportive environment.

Group or Individual Targeted Responses

Although most programs in the review use a universal prevention approach, some interventions target specific groups of students. Some programs, such as the Sensibility Development Program against Cyberbullying, target students at-risk for exposure to bullying behaviors (Tanrıkulu et al., 2015). Others, such as Cyberprogram 2.0, are designed to be implemented with classroom-sized groups of students who are not explicitly identified as high risk (Garaigordobil & Martínez-Valderrey, 2015a, 2015b). Cyberprogram 2.0 (Garaigordobil & Martínez-Valderrey, 2015a, 2015b), implemented in Spain, is a targeted anti-cyberbullying program aiming to increase adolescents’ anti-bullying skills through building interpersonal conflict resolution skills and self-esteem. The intervention consisted of 19 one-hour sessions with groups of approximately twenty adolescents, using group dynamic strategies “to stimulate the performance of the activity and the debate,” such as role-playing, brainstorming, case study, and guided discussion through questions (pg. 231). Another example, The Sensitivity Development Program against Cyberbullying (Tanrıkulu et al., 2013), implemented in Istanbul, specifically targeted adolescents at-risk of being exposed to cyberbullying behaviors. The treatment group of eight youth participated in five sessions, which each contained psychologically based group activities to increase cyberbullying awareness, and computer-based lectures to increase technical knowledge about cyberspace and a discussion facilitated by a technology expert.

Systematic Review and Meta-analysis Results

The full results of our search, screen, and data extraction procedures can be found in the PRISMA flowchart (Fig. 2). Our search resulted in 11,588 citations. A total of 3232 were identified as duplicates and removed. Of the 8356 remaining citations, 7.817 were excluded during abstract screening, yielding 483 citations for full-text review. Of the 465 full-text PDFs retrieved and reviewed, 73 met our eligibility criteria and were retained for analysis. These full-text articles were grouped based on whether they used the same sample, yielding a total of 50 independent studies for our review and synthesis. Characteristics from each included study can be found in Supplemental Table 2.
Fig. 2

PRISMA flow diagram

PRISMA flow diagram Overall meta-analysis results SE standard error, CI confidence interval, PI prediction interval, PPI probability of positive impact Of the 50 studies (Table 1), most were conducted outside the USA (64%), published in a peer-reviewed journal (76%), and received funding (54%). A small majority of studies used random assignment (54%), yet only 18% of studies met the WWC’s highest rating (meets WWC standards without reservation). Fewer than half of included studies sampled students from low or low-middle socioeconomic status (24%), and studies on average included about a third of students who identified as nonwhite (35%). Fewer than half the students were identified by the studies as male (48%) and averaged 13.0 years old (SD = 1.73). A large share of the programs directly targeted cyberbullying (76%), and the average program lasted 22 weeks.
Table 1

Summary characteristics of included studies

CharacteristicsSummary statistic

Studies (effect sizes)

Participants (M, SD)

50 (320)

45,371 (1600, 4624)

Publication status
Published38 (76%)
Unpublished12 (24%)
Funding
Funded27 (54%)
Not funded23 (46%)
Program target
Cyberbullying38 (76%)
Not cyberbullying12 (24%)
Design
NR-Cls5 (10%)
NR-Ind7 (14%)
NR-Scl11 (22%)
R-Cls10 (20%)
R-Scl11 (22%)
R-Ind6 (12%)
WWC rating
MSWoR9 (18%)
MSWR19 (38%)
DNMS22 (44%)
Location
USA18 (36%)
Non-USA32 (64%)
SES
Low11 (22%)
Low-middle9 (18%)
Middle12 (24%)
High-middle13 (26%)
High5 (10%)
Mean percentage male51%
Mean percentage nonwhite35%
Mean age in years (SD)13 (1.73)
Mean length of intervention in weeks (SD)22 (25.5)

Study-level summary statistics presented

NR-Cls non-random assignment at the classroom level, NR-Ind non-random assignment at the individual level, NR-Sclnon-random assignment at the school level, R-Cls random assignment at the classroom level, R-Ind random assignment at the individual level, MSWoR meets WWC standards without reservation, MSWR meets standards with reservation, DNMS does not meet WWC standards

A total of 45,371 students participated in the identified evaluations. Separate analyses were conducted for each of the four outcome categories: (1) cyberbullying perpetration (44 studies, 96 effect sizes), (2) cyberbullying victimization (39 studies, 75 effect sizes), (3) traditional bullying perpetration (22 studies, 67 effect sizes), and (4) traditional bullying victimization (24 studies, 82 effect sizes). Across all 50 included studies, we estimated 320 effect sizes. The results of the meta-analytic models revealed that school-based prevention or intervention programs were associated with significant reductions in all four outcome variables (Table 2). The programs were associated with significant reductions in cyberbullying perpetration (k = 44, m = 96, g = −0.18, SE = 0.05, p = 0.0001, 95% CI [−0.28, −0.09]) and cyberbullying victimization (k = 39, m = 75, g = −0.13, SE = 0.04, p = 0.0012, 95% CI [−0.21, −0.05]). The programs, on average, were also associated with significant reductions in traditional bullying perpetration (k = 22, m = 67, g = −0.18, SE = 0.05, p = 0.0008, 95% CI [−0.28, −0.08]), and traditional bullying victimization (k = 24, m = 82, g = −0.16, SE = 0.05, p = 0.0039, 95% CI [−0.27, −0.05]). For all four outcomes, the results indicated moderate to high heterogeneity (τ2: cyberbullying perpetration = 0.06; cyberbullying victimization = 0.02; bully perpetration = 0.03; bully victimization = 0.05). Based on these findings, the programs included in our synthesis have a 76% probability of reducing cyberbullying perpetration and a 73% probability of reducing cyberbullying victimization.
Table 2

Overall meta-analysis results

Outcome domainNumber of studiesNumber of effect sizesAverage effect size (SE)95% CITau-squared (between)I-squared (between, within)95% PIPPI
Cyberbullying perpetration4496 −0.18 (.05) −0.28, −0.090.0679.71, 9.78 −0.67, 0.3076.08
Cyberbullying victimization3975 −0.13 (.04) −0.21, −0.050.0234.90, 53.77 −0.40, 0.1472.61
Bullying perpetration2267 −0.18 (.05) −0.28, −0.080.0355.20, 37.44 −0.54, 0.1777.94
Bullying victimization2482 −0.16 (.05) −0.27, −0.050.0563.21, 28.97 −0.59, 0.2673.19

SE standard error, CI confidence interval, PI prediction interval, PPI probability of positive impact

We conducted two sets of moderator analyses, confirmatory and exploratory. For both cyberbullying perpetration and victimization, the confirmatory moderator results indicated that none of the six variables were related to the intervention effectiveness (Tables 3 and 4, respectively). It should be noted, however, that programs with a focus on cyberbullying were found to have a higher average intervention effectiveness for both cyberbullying perpetration and victimization, relative to programs with a focus on general violence prevention. The confirmatory moderator results for traditional bullying perpetration and victimization revealed similar findings for most moderators (Supplemental Tables 3, 4). One notable exception was the targeting of cyberbullying: for both traditional bullying perpetration and victimization, programs that included a specific cyberbullying targeted component were more effective compared to general prevention programming (perpetration: targeting = −0.26, non-targeting = −0.02, p = 0.01; victimization: targeting = −0.25, non-targeting = −0.01, p = 0.02).
Table 3

Confirmatory moderator analyses for cyberbullying perpetration

VariableNumber of studiesNumber of effectsCoef. or meanStandard error95% CI—Lower95% CI—UpperT-statisticdfp-value
Country of origin0.8723.280.39
Non-USA3066 −0.220.04−0.31−0.13
USA1430 −0.110.11−0.330.10
Focus of program−0.5312.570.61
No cyber target926 −0.150.08−0.300.01
Cyberbullying targeted3570 −0.200.06−0.30−0.09
Timepoint0.103.050.92
Posttest4279−0.180.05−0.28−0.09
Follow-up817−0.180.06−0.29−0.07
Effect size type2.212.940.12
Continuous3680−0.200.05−0.29−0.11
Dichotomous916−0.050.08−0.200.11
Percent males44960.030.03−0.030.100.961.200.49
Percent nonwhite4496−0.110.12−0.340.12−0.9419.660.36

df degrees of freedom

Table 4

Confirmatory moderator analyses for cyberbullying victimization

VariableNumber of studiesNumber of effectsCoef. or meanStandard error95% CI-Lower95% CI-UpperT-statisticdfp-value
Country of origin0.8724.220.39
Non-USA2447−0.150.05−0.26−0.04
USA1528−0.110.06−0.210.01
Focus of program−0.5016.790.62
No cyber target1227−0.110.06−0.230.02
Cyberbullying targeted2748−0.150.05−0.24−0.05
Timepoint0.556.120.60
Posttest3657−0.140.04−0.22−0.05
Follow-up818−0.110.04−0.18−0.04
Effect size type1.219.850.26
Continuous2953−0.160.04−0.24−0.09
Dichotomous10220.000.13−0.250.25
Percent males3975−0.380.17−0.71−0.05−2.232.890.12
Percent nonwhite3975−0.130.10−0.320.07−1.2814.280.22

df degrees of freedom

Confirmatory moderator analyses for cyberbullying perpetration df degrees of freedom Confirmatory moderator analyses for cyberbullying victimization df degrees of freedom We conducted two sets of exploratory moderator analyses. The first set of exploratory analyses investigated whether the WWC rating or a program’s core component category explained variation between included studies. We conducted these analyses across all four outcome domains. For the analysis of the WWC rating, the results indicated that studies meetings standards had a slightly larger average effect across each domain, but the differences were not statistically significant (Supplement Table 5). The results of the program core component did not indicate any statistically significant or substantively important trends (Supplemental Tables 6–9 ). The second set of exploratory analyses used a multiple-predictor meta-regression analysis; the results revealed two statistically significant findings. Intervention effects were larger for cyberbullying victimization when a larger proportion of males were in the sample (b = −0.43, p = 0.01) and for samples of higher socioeconomic status (b = −0.12, p = 0.04). The proportion of males in the sample was not significant as a standalone moderator in the confirmatory analyses, so we are cautious not to overinterpret its significance in the multivariate exploratory analyses that controlled for other covariates. The full results from these models can be found in Supplemental Tables S10–S13. We conducted several publication bias analyses to investigate any potential impact. First, we conducted a meta-regression analysis including publication status as a predictor, and the results indicated that published studies had slightly yet non-statistically significantly smaller intervention effects (b = 0.03, SE = 0.15, t(14) = 0.22, p = 0.83). Second, we conducted two trim and fill tests for cyberbullying perpetration and victimization, one ignoring effect size dependency and one aggregating effects to the study level. Each of the analyses indicated no presence of publication bias (Figures S1–S4). Third, our final publication bias analysis, Egger’s test using the sandwich estimator (Egger et al., 1997), accounted for the dependency among effect sizes. The results again revealed no presence of publication bias (b = −0.48, SE = 0.29, t(1.4) = 1.62, p = 0.30). Finally, we conducted sensitivity analyses to investigate the potential impact of our missing data technique (Supplementary Tables S14, S15). The results did not reveal statistically significant findings that would nullify our main conclusions. We feel confident in the results and the resulting conclusions.

Discussion

The purpose of this project was to understand the effectiveness of prevention programs at reducing cyberbullying perpetration and victimization. To do so, we conducted a comprehensive systematic review and meta-analysis, locating and synthesizing published and unpublished studies. We identified 50 primary studies, extracting 320 total effect sizes, spanning multiple countries and 45,371 participants. All of these evaluations were conducted within the last 15 years and the vast majority, 36 studies, within the last 5 years. The results of the meta-analysis indicated that the prevention programs were effective for both cyberbullying perpetration as well as victimization. Program effectiveness was slightly larger for cyberbullying perpetration (g = −0.18) compared to cyberbullying victimization (g = −0.13). Translated to PPI (Mathur & VanderWeele, 2020), we estimated that the average program would have a 76% and 73% probability of reducing cyberbullying perpetration and victimization, respectively. We are relatively confident, therefore, that future implementation of one of the included programs that showed statistically significant intervention effects will reduce cyberbullying. These findings align with previous meta-analyses and systematic reviews that found evidence for the effectiveness of cyberbullying prevention programs in reducing cyber victimization and perpetration. For example, our findings were consistent with recent meta-analyses by Van Cleemput and colleagues (2014) and Gaffney and colleagues (2019a), which found that cyberbullying prevention programs were associated with significant reductions of both cyberbullying perpetration and victimization. Mishna and colleagues (2011), however, found that cyber abuse prevention programs were only associated with an increase in internet safety knowledge. The discrepancies with Mishna and colleagues (2011) could be due to differences in the scope of their inclusion criteria or due to our use of more advanced meta-analytic techniques. Overall, our findings strengthen the support for the effectiveness of cyberbullying prevention programs.

Implications for Prevention Policy and Practice

Results from our confirmatory moderator analyses suggest programs that specifically target cyberbullying behavior were more effective in reducing cyberbullying relative to general violence prevention programs. This is especially clear from the results of the synthesis of traditional bullying outcomes: programs that include a cyberbullying component were more effective than programs that do not. We suspect this finding could be a time driven effect (i.e., violence prevention programs have improved over time and cyberbullying has only emerged recently, and thus, these programs would have leveraged more state-of-the-art techniques), but were unable to test this in our analysis due to the restricted publication date range of studies included in our review. This could also result from the common overlap between both forms of bullying (Espelage et al., 2013a, 2013b). Some caution is needed because the review of traditional bullying outcomes was a result of them being measured in the same study as cyberbullying outcomes. Therefore, the results of the bullying outcomes meta-analysis are not comprehensive. Most bullying prevention program meta-analyses, however, find average effects are about 0.15–0.20 (Gaffney et al., 2019b; Ttofi & Farrington, 2011), which is lower than the average effect for including a cyberbullying component found in this meta-analysis (0.25). Future research should confirm this finding to determine whether traditional bullying could be reduced simply by including a cyberbullying component within the prevention program. However, traditional anti-bullying programs cannot be expected to also serve as anti-cyberbullying programs. Also notable, although a small majority of studies used a random assignment procedure (54%), only 18% of studies met the highest WWC rating; more than 4 in 10 studies (44%) did not meet WWC standards. These descriptive findings suggest that evaluations of cyberbullying or related programs require greater attention to study design and study quality. The WWC’s rating system is designed to ensure that only the most rigorously designed and evaluated studies contribute to assessments of program effectiveness. Despite moderator results revealing no statistically significant differences between studies that meet and did not meet WWC standards, the field must be cautious in using future evaluations without a rigorous study design. The remainder of our moderator results were also not statistically significant; thus, we can only speculate useful information for practitioners and policymakers. One variable that did trend in the direction hypothesized, however, was the country of origin. As found in other previous work (Yeager et al., 2015), studies conducted outside of the USA produced greater overall effectiveness. While it is not clear why these differences have consistently emerged, it could be due in part to an implicit and explicit focus on understanding and preventing cyberbullying, and the development of prevention programs by European scientists from 2008 through 2012. During this time, an intergovernmental framework for European Cooperation in Science and Technology ([COST], Välimäki et al., 2013) included 28 participating European countries (the USA was not a participating country), allowing the coordination of nationally funded research in Europe on cyberbullying. The COST collaboration contributes to reducing the fragmentation in European research investments and opening the European Research Area to cooperation worldwide, and has led to the development of numerous prevention programs targeting cyberbullying. We are not aware of a similar collaboration in North America. The results show promise in reducing cyberbullying and traditional bullying behaviors. Our recommendation to those looking for guidance in cyberbullying prevention is to select a program in our review that has been evaluated using a random assignment procedure, met the WWC’s highest rating, and has a treatment effect greater than 0.10. Selecting one of these programs means there is a great probability that the intervention will lead to a lower incidence of cyberbullying compared to a known-neutral alternative or none at all. Several of the included studies fit these criteria. We stop short of recommending any specific programs because multiple factors might weigh differently in the practice of subscribing to a program, such as school culture and classroom needs. Additionally, schools must also carefully consider the availability of resources needed for program implementation. Although we attempted to collect cost information, none of the studies specifically mentioned program or per-pupil expenditures.

Using Transparent and Reproducible Meta-analytic Practices

Conducting a high-quality systematic review and meta-analysis has historically meant using transparent methods and following comprehensive reporting guidelines (APA Publications and Communications Board Working Group on Journal Reporting Standards, 2008). Several recent meta-review results indicate, however, that some meta-analysts have failed to transparently report all elements of the review process (Polanin et al., 2020). Few meta-analysts, furthermore, report their statistical scripts and complete datasets, despite their own reliance on the reporting practices of primary researchers. Part of the purpose of this manuscript, therefore, was to continue the push for transparent reporting and reflect on this process. As articulated in the “Methods” section, we made available all datasets, scripts, codebooks, and other materials necessary to completely reproduce the analyses and results. The process to do so is challenging, requires forethought, and experiences to know what to and what not to focus on, which is difficult to achieve during the early stages of the review process. We found the most challenging aspect was “data wrangling” (especially moving from the extracted dataset to the analytic dataset) and producing tables from the software’s output. The former problem is one many data scientists and statisticians struggle with and simply requires continued education and experience. The latter is an element that will require continued support from the R package maintainers and developers. Our attempt to conduct a fully reproducible analysis, including the final tables, is at the forefront of this movement. We suspect that with time, software package developers and maintainers will make it easy for meta-analysts to produce well-formatted final tables from their analyses. Until then, we encourage meta-analysts to use our reporting as a guide: produce the reproducible scripts, publish the datasets, and ensure that the analyses are labeled and correspond to the analyses in the manuscript.

Conclusions

Our work reflects the most comprehensive systematic review and meta-analysis to date that examined the effectiveness of K-12 school-based prevention programs in reducing both cyberbullying and traditional bullying outcomes. Results indicated that when programs have an explicit focus on targeting cyberbullying, reductions are achieved for both cyberbullying and traditional bullying. We strongly encourage developers of bully prevention programs or those that are revising their programs to include specific and elaborate content on cyberbullying, given its rising prevalence and associations with other forms of aggression. The results of this systematic review and meta-analysis should help guide future developers, education practitioners, and administrators reduce cyberbullying perpetration and victimization, with the hopes of increasing the success and well-being of students. Below is the link to the electronic supplementary material. Supplementary file1 (DOCX 173 KB)
  41 in total

1.  Impact of the ConRed program on different cyberbulling roles.

Authors:  Rosario Del Rey; José A Casas; Rosario Ortega
Journal:  Aggress Behav       Date:  2015-09-09       Impact factor: 2.917

2.  Defining cyberbullying: a qualitative research into the perceptions of youngsters.

Authors:  Heidi Vandebosch; Katrien Van Cleemput
Journal:  Cyberpsychol Behav       Date:  2008-08

3.  Longitudinal associations between cyber-bullying perpetration and victimization and problem behavior and mental health problems in young Australians.

Authors:  Sheryl A Hemphill; Aneta Kotevski; Jessica A Heerde
Journal:  Int J Public Health       Date:  2015-01-15       Impact factor: 3.380

4.  The impact of a middle school program to reduce aggression, victimization, and sexual violence.

Authors:  Dorothy L Espelage; Sabina Low; Joshua R Polanin; Eric C Brown
Journal:  J Adolesc Health       Date:  2013-05-01       Impact factor: 5.012

Review 5.  Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.

Authors:  Kathryn L Modecki; Jeannie Minchin; Allen G Harbaugh; Nancy G Guerra; Kevin C Runions
Journal:  J Adolesc Health       Date:  2014-08-25       Impact factor: 5.012

6.  Evidence-based intervention against bullying and cyberbullying: Evaluation of the NoTrap! program in two independent trials.

Authors:  Benedetta E Palladino; Annalaura Nocentini; Ersilia Menesini
Journal:  Aggress Behav       Date:  2016 Mar-Apr       Impact factor: 2.917

Review 7.  What works in prevention. Principles of effective prevention programs.

Authors:  Maury Nation; Cindy Crusto; Abraham Wandersman; Karol L Kumpfer; Diana Seybolt; Erin Morrissey-Kane; Katrina Davino
Journal:  Am Psychol       Date:  2003 Jun-Jul

8.  Online aggressor/targets, aggressors, and targets: a comparison of associated youth characteristics.

Authors:  Michele L Ybarra; Kimberly J Mitchell
Journal:  J Child Psychol Psychiatry       Date:  2004-10       Impact factor: 8.982

9.  The Efficacy of the Tabby Improved Prevention and Intervention Program in Reducing Cyberbullying and Cybervictimization among Students.

Authors:  Anna Sorrentino; Anna Costanza Baldry; David P Farrington
Journal:  Int J Environ Res Public Health       Date:  2018-11-13       Impact factor: 3.390

10.  Cyber bullying prevention: intervention in Taiwan.

Authors:  Ming-Shinn Lee; Wu Zi-Pei; Leif Svanström; Koustuv Dalal
Journal:  PLoS One       Date:  2013-05-28       Impact factor: 3.240

View more
  4 in total

1.  Modern Meta-Analytic Methods in Prevention Science: Introduction to the Special Issue.

Authors:  Emily E Tanner-Smith; Sean Grant; Evan Mayo-Wilson
Journal:  Prev Sci       Date:  2022-02-16

2.  Next-Generation Meta-analysis for Next-Generation Questions: Introducing the Prevention Science Special Issue on Modern Meta-analytic Methods.

Authors:  G J Melendez-Torres
Journal:  Prev Sci       Date:  2021-12-21

3.  A Longitudinal Process Model Evaluating the Effects of Cooperative Learning on Victimization, Stress, Mental Health, and Academic Engagement in Middle School.

Authors:  Mark J Van Ryzin; Sabina Low; Cary J Roseth; Dorothy Espelage
Journal:  Int J Bullying Prev       Date:  2022-08-02

4.  The Effects of a Cyberbullying Intervention Programme Among Primary School Students.

Authors:  Ágnes Lukács J; Johanna Takács; Zsuzsanna Soósné Kiss; Máté Kapitány-Fövény; András Falus; Helga Judit Feith
Journal:  Child Youth Care Forum       Date:  2022-10-02
  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.