| Literature DB >> 35944038 |
Daniëlle N M Bleize1, Doeschka J Anschütz1, Martin Tanis2, Moniek Buijzen3.
Abstract
Early adolescents frequently use mobile messaging apps to communicate with peers. The popularity of such messaging apps has a critical drawback because it increases conformity to cyber aggression. Cyber aggression includes aggressive peer behaviors such as nasty comments, nonconsensual image sharing, and social exclusion, to which adolescents subsequently conform. Recent empirical research points to peer group norms and reduced accountability as two essential determinants of conformity to cyber aggression. Therefore, the current study aimed to counteract these two determinants in a 2 (peer group norms counteracted: yes, no) x 2 (reduced accountability counteracted: yes, no) design. We created four intervention conditions that addressed adolescents' deficits in information, motivation, and behavioral skills. Depending on the condition (peer group norms, reduced accountability, combination, or control), we first informed participants about the influence of the relevant determinant (e.g., peer group norms). Subsequently, participants performed a self-persuasion task and formulated implementation-intentions to increase their motivation and behavioral skills not to conform to cyber aggression. Effectiveness was tested with a messaging app paradigm and self-report among a sample of 377 adolescents (Mage = 12.99, SDage = 0.84; 53.6% boys). Factorial ANCOVAs revealed that none of the intervention conditions reduced conformity to cyber aggression. Moreover, individual differences in susceptibility to peer pressure or inhibitory control among adolescents did not moderate the expected relations. Therefore, there is no evidence that our intervention effectively reduces conformity to cyber aggression. The findings from this first intervention effort point to the complex relationship between theory and practice. Our findings warrant future research to develop potential intervention tools that could effectively reduce conformity to cyber aggression.Entities:
Mesh:
Year: 2022 PMID: 35944038 PMCID: PMC9362912 DOI: 10.1371/journal.pone.0272615
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.752
Fig 1Study procedure.
Overview of the Implementation of the IMB components in each intervention condition.
| Intervention component | Intervention conditions | |||
|---|---|---|---|---|
| Peer group norms | Reduced accountability | Combination | ||
|
| ||||
| General information | Basic information about WhatsApp: (1) it is the most popular platform among Dutch adolescents and (2) 96% of Dutch adolescents uses WhatsApp. | Basic information about WhatsApp: (1) it is the most popular platform among Dutch adolescents and (2) 96% of Dutch adolescents uses WhatsApp. | Basic information about WhatsApp: (1) it is the most popular platform among Dutch adolescents and (2) 96% of Dutch adolescents uses WhatsApp. | |
| Context 1: target behavior | Description of the target behavior: on WhatsApp, people sometimes do nasty things | Description of the target behavior: on WhatsApp, people sometimes do nasty things | Description of the target behavior: on WhatsApp, people sometimes do nasty things | |
| Context 2: examples of target behavior | Examples of cyber aggression on WhatsApp: impersonation, visual, written-verbal, social exclusion. | Examples of cyber aggression on WhatsApp: impersonation, visual, written-verbal, social exclusion. | Examples of cyber aggression on WhatsApp: impersonation, visual, written-verbal, social exclusion. | |
| Context 3: influence of determinant | Description of the determinant: | Description of the determinant: | Description of the determinant: | |
| Social norm | Description of the general social norm: hardly anyone approves of cyber aggressive behaviors on WhatsApp, but they occur nonetheless. | Description of the general social norm: hardly anyone approves of cyber aggressive behaviors on WhatsApp, but they occur nonetheless. | Description of the general social norm: hardly anyone approves of cyber aggressive behaviors on WhatsApp, but they occur nonetheless. | |
|
| ||||
| Self-persuasion | Self-generated arguments: If WhatsApp group members engage in cyber aggressive behaviors, why would you NOT join in? Please formulate 2 reasons for why you would not engage in cyber aggression if your group members do so. Type your reasons in the e-module. | Self-generated arguments: If WhatsApp group members engage in cyber aggressive behaviors, why would you NOT join in? Please formulate 2 reasons for why you would not engage in cyber aggression if your group members do so. Type your reasons in the e-module. | Self-generated arguments: If WhatsApp group members engage in cyber aggressive behaviors, why would you NOT join in? Please formulate 2 reasons for why you would not engage in cyber aggression if your group members do so. Type your reasons in the e-module. | |
| Commitment enhancement | Participants’ arguments were displayed back to them on their screen and participants had to confirm that these were their self-generated arguments. | Participants’ arguments were displayed back to them on their screen and participants had to confirm that these were their self-generated arguments. | Participants’ arguments were displayed back to them on their screen and participants had to confirm that these were their self-generated arguments. | |
|
| ||||
| Implementation-intention | If-then plan: If WhatsApp group members engage in cyber aggressive behaviors, what would you do? Type your if-then plan in the e-module. | If-then plan: If WhatsApp group members engage in cyber aggressive behaviors, what would you do? Type your if-then plan in the e-module. | If-then plan: If WhatsApp group members engage in cyber aggressive behaviors, what would you do? Type your if-then plan in the e-module. | |
| Commitment enhancement | Participants’ if-then plans were displayed back to them on their screen, and participants had to confirm that this was their if-then plan. | Participants’ if-then plans were displayed back to them on their screen, and participants had to confirm that this was their if-then plan. | Participants’ if-then plans were displayed back to them on their screen, and participants had to confirm that this was their if-then plan. | |
| Repetition 1 | Participants were asked to read and repeat their if-then plan 3 times in their head. | Participants were asked to read and repeat their if-then plan 3 times in their head. | Participants were asked to read and repeat their if-then plan 3 times in their head. | |
| Repetition 2 | Participants were asked to type in their if-then plan once more. | Participants were asked to type in their if-then plan once more. | Participants were asked to type in their if-then plan once more. | |
Note. Differences in the content between the conditions are underlined and in bold.
Means and standard deviations of key variables.
| Range |
|
|
| |
|---|---|---|---|---|
|
| ||||
| Experimental conformity to cyber aggressive attitudes | 0–4] | 1.68 | 1.14 | 353 |
| Experimental conformity to cyber aggressive intentions | [0–4] | 1.82 | 1.14 | 362 |
| Self-reported conformity to cyber aggression (Time 1) | [1–6] | 1.67 | 0.70 | 377 |
| Self-reported conformity to cyber aggression (Time 2) | [1–6] | 1.48 | 0.56 | 167 |
|
| ||||
| Susceptibility to peer pressure | [1–6] | 2.11 | 0.91 | 377 |
| Inhibitory control | [1–3] | 1.69 | 0.39 | 377 |
|
| ||||
| Perceived importance not to conform | [1–6] | 4.14 | 1.60 | 377 |
| Perceived ease not to conform | [1–6] | 4.79 | 1.18 | 377 |
| Enjoyment of the intervention | [1–6] | 4.20 | 0.89 | 377 |
Descriptive statistics directly after the intervention (Time 1, N = 377) and four weeks post-intervention (Time 2, N = 167).
| Time 1 | Time 2 | ||
|---|---|---|---|
| Used WhatsApp | |||
| No | 0.3% | 0% | |
| Yes | 99.7% | 100% | |
| Member of a group on WhatsApp | |||
| No | 1.1% | 0.6% | |
| Yes | 98.9% | 99.4% | |
| Number of active WhatsApp groups | |||
| 0 | 0.3% | 0.6% | |
| 1 to 5 | 50.8% | 57.2% | |
| 6 to 10 | 33.2% | 30.2% | |
| 11 to 15 | 8.3% | 6.0% | |
| 16 to 20 | 4.0% | 4.2% | |
| 21 to 25 | 1.3% | 1.2% | |
| 26 to 30 | 0.5% | 0.6% | |
| 30 or more | 1.6% | 0% | |
| WhatsApp use in days per week | |||
| 7 days | 89.1% | 88.6% | |
| 6 days | 3.5% | 4.2% | |
| 5 days or less | 7.4% | 7.2% | |
| WhatsApp use in hours per day | |||
| Less than 30 minutes per day | 18.4% | 18.6% | |
| 30 minutes per day | 20.7% | 22.7% | |
| 1 hour per day | 34.8% | 31.1% | |
| 2 hours per day | 13.0% | 16.8% | |
| 3 hours per day | 8.2% | 6.0% | |
| 4 hours per day | 2.1% | 1.2% | |
| 5 or more hours per day | 2.8% | 3.6% | |
| Prevalence in social environment | 1.97 (0.92) | 1.91 (0.85) | |
| Nonconformity to cyber aggression | 4.18 (1.56) | 4.32 (1.62) | |
Means and standard deviations for the outcome variables in each condition directly after the intervention (Time 1) and four weeks post-intervention (Time 2).
| Peer group norms | |||
|---|---|---|---|
| Reduced accountability | Yes | No | Outcome variable |
| Time 1 | |||
| Yes | 1.83 (1.18) | 1.65 (1.16) | Conformity to attitudes in messaging paradigm |
| No | 1.80 (1.07) | 1.81 (1.21) | |
| Yes | 1.68 (1.15) | 1.98 (1.08) | Conformity to intentions in messaging paradigm |
| No | 1.96 (1.11) | 1.85 (1.15) | |
| Yes | 1.76 (0.79) | 1.79 (0.70) | Self-reported conformity |
| No | 1.83 (0.68) | 1.82 (0.70) | |
| Time 2 | |||
| Yes | 1.43 (0.40) | 1.49 (0.52) | Self-reported conformity |
| No | 1.80 (0.85) | 1.60 (0.51) | |
Fig 2Means for the outcome variables per condition (Error bars representing standard deviations).