Literature DB >> 35944038

Testing a first online intervention to reduce conformity to cyber aggression in messaging apps.

Daniëlle N M Bleize1, Doeschka J Anschütz1, Martin Tanis2, Moniek Buijzen3.   

Abstract

Early adolescents frequently use mobile messaging apps to communicate with peers. The popularity of such messaging apps has a critical drawback because it increases conformity to cyber aggression. Cyber aggression includes aggressive peer behaviors such as nasty comments, nonconsensual image sharing, and social exclusion, to which adolescents subsequently conform. Recent empirical research points to peer group norms and reduced accountability as two essential determinants of conformity to cyber aggression. Therefore, the current study aimed to counteract these two determinants in a 2 (peer group norms counteracted: yes, no) x 2 (reduced accountability counteracted: yes, no) design. We created four intervention conditions that addressed adolescents' deficits in information, motivation, and behavioral skills. Depending on the condition (peer group norms, reduced accountability, combination, or control), we first informed participants about the influence of the relevant determinant (e.g., peer group norms). Subsequently, participants performed a self-persuasion task and formulated implementation-intentions to increase their motivation and behavioral skills not to conform to cyber aggression. Effectiveness was tested with a messaging app paradigm and self-report among a sample of 377 adolescents (Mage = 12.99, SDage = 0.84; 53.6% boys). Factorial ANCOVAs revealed that none of the intervention conditions reduced conformity to cyber aggression. Moreover, individual differences in susceptibility to peer pressure or inhibitory control among adolescents did not moderate the expected relations. Therefore, there is no evidence that our intervention effectively reduces conformity to cyber aggression. The findings from this first intervention effort point to the complex relationship between theory and practice. Our findings warrant future research to develop potential intervention tools that could effectively reduce conformity to cyber aggression.

Entities:  

Mesh:

Year:  2022        PMID: 35944038      PMCID: PMC9362912          DOI: 10.1371/journal.pone.0272615

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.752


Introduction

Messaging apps such as WhatsApp have become tremendously popular among early adolescents worldwide [1-3]. Unfortunately, this has also led to increasing group-based cyber aggression on these messaging apps. Cyber aggression includes all derogatory, offensive, or harmful online peer-to-peer behaviors [2-5]. It is, thus, a more comprehensive concept than cyberbullying–which researchers conceptualize more narrowly as repetitive, with intent to harm, and stemming from power imbalance [6-8]. Particularly problematic in messaging apps is that adolescents conform to each other’s negative peer behaviors. An example of this is when members of a WhatsApp group share nasty comments about a peer among each other. Messaging apps are pre-eminently suited for such conformity behaviors, because these apps provide private communication channels with intimate friends or other social ties [9, 10]. However, being involved in cyber aggression poses significant risks for adolescents’ well-being, such as poor academic performance [11], mental health problems [12-14], and even self-harm [6, 12, 15]. These risks call for intervention efforts to reduce conformity to cyber aggression in adolescents’ messaging apps. Typically adolescents agree that it is wrong to engage in cyber aggressive behaviors [16]. However, it can be difficult not to conform when these behaviors occur in adolescents’ messaging app groups. It can be difficult to not conform because group conformity is a potent mechanism through which adolescents influence each other [17, 18]. Adolescents have a strong urge to belong to peer groups [5, 19]. Group conformity is associated with social rewards (e.g., social recognition from peers). Obtaining such social rewards typically increases adolescents’ self-esteem [20]. Moreover, adolescents perceive those who engage in cyber aggression as more popular. Therefore, aggressive behaviors become a way to gain status among peers [18, 21]. For example, empirical work has shown that adolescents who bully are perceived as more popular by their peers over time [22, 23]. Furthermore, from theory in the field of developmental psychology we know that adolescents’ immature cognitive development causes them to experience difficulties inhibiting (initial) behavioral responses [24, 25]. Receiving a private picture of a peer can bring feelings of excitement or sensation [26, 27], which can subsequently impede adolescents to reflect critically on the consequences of their behavior. Altogether, it may be difficult for adolescents not to conform to cyber aggressive behaviors when these occur in messaging apps. There is, thus, an urgent need for intervention efforts that help adolescents to not conform to cyber aggression [28]. The objective of the current study is to develop and assess the effectiveness of a behavior change intervention to reduce conformity to cyber aggression in early adolescents’ messaging apps. Intervention programs so far have not specifically targeted the theoretical mechanisms related to conformity to harmful peer-to-peer behaviors. Additionally, only few focused on the unique context of messaging apps [3, 29]. Therefore, the development of our intervention consists of two steps. In the first step, we identify the critical determinants of conformity to cyber aggression in messaging apps. To do this, we will review recent empirical research on messaging app groups. In the second step, we systematically translate the relevant theoretical insights to an applied intervention. To develop this intervention, we will use a behavior change framework that has proven successful in eliciting positive behavior change: the Information-Motivation-Behavioral Skills framework [IMB framework, 30, 31].

Theoretical background

Empirical research on conformity to cyber aggression

The first step in developing our intervention is to review the empirical research on aggressive behavior in general, and on conformity to cyber aggression specifically. Over the past few decades, research on adolescent development has consistently revealed that peer influence plays an essential role in the occurrence of aggressive behaviors [18, 32, 33]. Recent literature and meta reviews also corroborate the role of peer influence [34, 35]. Adolescents are attuned to positive regard from peers [18, 36] and look at their peers to understand which behaviors are acceptable and desired. Researchers refer to this susceptibility to peers as peer socialization [18]. Generally speaking, adolescents tend to conform to peer norms [5, 18], especially when it concerns close peers like friends [5, 32, 37, 38]. Key empirical studies have shown that conforming to the standards of a valued group allows adolescents to gain status in the group and helps them to obtain a positive sense of self [18, 20, 21]. Empirical studies on conformity to peer aggression have pointed to the relevance of two specific determinants of conformity: peer group norms and reduced accountability. First, studies show that aggression among adolescents increases when aggression is considered acceptable by peers [32, 33]. If peers are positive towards aggressive behaviors, other adolescents are more likely to engage in these behaviors as well. Second, studies show that aggressive peer behaviors occur more frequently when perpetrators are not held accountable for their behaviors (when they think their actions remain confidential from people outside of their peer group) [39-41]. A recent systematic review on the determinants and consequences of bystander interventions in cyberbullying found that perceived accountability boosts the likelihood that people will refrain from conforming to cyber aggression and instead help victims [42]. Adolescents who feel unaccountable to others typically perceive little risk of potential adult intervention or punishment for their behaviors [2, 43]. Consequently, adolescents are more likely to behave consistent with their peers’ attitudes and behaviors. Bleize et al. [44] examined whether peer group norms and reduced accountability affect conformity to cyber aggression in early adolescents’ messaging apps. In two experiments, they found evidence supporting the relevance of these two determinants. Both experiments included a scripted WhatsApp conversation to test conformity to cyber aggressive group norms. The authors led participants to believe that they would have a conversation about cyber aggressive behaviors with some of their peers and that their reactions in the conversation would remain private or be made public. In reality, the authors preprogrammed the responses in the conversation. Participants replied to the preprogrammed responses of several ostensible peers. The results of the experiments showed that adolescents consistently conformed to cyber aggressive group norms. When peers indicated approval for cyber aggression (e.g., forwarding nasty messages about a peer), adolescents also became more positive towards the behavior [44]. Moreover, Bleize et al. [44] found support for the process of reduced accountability. When the researchers told adolescents that their responses in the messaging app group would remain private to others outside of the group, adolescents conformed more to cyber aggressive group norms (compared to when the authors told adolescents that they had to share their responses publicly in-class) [44]. In sum, Bleize et al.’s [44] findings confirm that peer group norms and reduced accountability influence conformity to cyber aggression.

Applying a theoretical framework to intervention development

The second step in developing an intervention is to systematically translate the above-mentioned theoretical insights to an applied intervention. We used the Information-Motivation-Behavioral Skills framework [IMB framework, 30, 31] for this purpose. The IMB framework is a theoretical framework to help develop behavioral interventions. It was explicitly designed to be easy to translate to empirically targeted interventions and has proven successful in eliciting positive behavior change [e.g., tackling cyber aggression and cyberbullying, 45]. The IMB framework proposes that three key elements should be included in interventions to stimulate positive behavior change: information, motivation, and behavioral skills [30, 31]. First, adolescents must be informed of and understand the desired behavior. This means that adolescents should know what the behavior entails, understand its underlying processes, and be aware of its consequences [31, 45]. According to the IMB framework, adolescents can only adapt their cyber aggressive behaviors if they can recognize them. Therefore, a successful intervention should inform adolescents about the determinants of cyber aggression (e.g., peer group norms and reduced accountability). Second, adolescents must feel motivated to perform the target behavior. Due to the affective nature of and social dynamics involved in aggressive behavior, adolescents may not always feel motivated to refrain from cyber aggression. Adolescents might recognize that nonconsensual image-sharing is wrong [16], but may still want to share these images with their friends [27]. In the context of cyber aggression, adolescents may feel more motivated to engage in the desired behavior if it is for personally relevant reasons. Therefore, a successful intervention should motivate adolescents not to conform to cyber aggression, for example by using self-persuasion [46, 47]. Third, adolescents must have the right behavioral skills to resist conformity to cyber aggression [31, 45]. Even when adolescents are knowledgeable about cyber aggression and feel motivated to act on their knowledge, they still need the skills to act appropriately in such situations. Implementation-intentions could be used to overcome potential inertia in situations involving cyber aggression [48-50]. These if-then plans can help adolescents to better regulate their behavior. In the methods section of this manuscript, we will elaborate on how exactly the three key elements of the IMB model are implemented in our intervention.

A behavior change intervention to reduce conformity in messaging apps

The objective of our study is to develop and assess the effectiveness of a behavior change intervention to reduce conformity to cyber aggression in early adolescents’ messaging apps. On a theoretical level, we aim to develop a theory-based intervention grounded in recent insights on conformity to cyber aggression in messaging app groups. In addition, we aim to systematically translate these insights into an effective applied intervention. On a practical level, we aim to test whether our intervention is indeed a viable approach to reduce conformity to aggressive peer behaviors in messaging apps. To reach our objective, the intervention will consist of four conditions (peer group norms, reduced accountability, combination, and control). All conditions except the control include the three key IMB model components of information, motivation and behavioral skills, which are considered necessary for any successful intervention [30, 31]. The implementation of the information component differs in each condition, depending on the target determinant (peer group norms, reduced accountability, or both). The implementation of the motivation and behavioral skills components (i.e., self-persuasion and implementation-intentions) is similar in each condition. We expect that the conditions focusing on either single process (peer group norms or reduced accountability) reduce conformity to cyber aggression compared to the control condition. Additionally, we expect a cumulative effect when these conditions are combined in the combination condition, because the peer group norms and reduced accountability conditions are both expected to reduce conformity. In other words, we expect the combination condition to be most effective. We examine the intervention conditions’ effectiveness both directly after the intervention (Time 1) and four weeks post-intervention (Time 2). Specifically, our expectations are as follows: H1: The condition targeting peer group norms reduces conformity to cyber aggression compared to the conditions not targeting peer group norms, both at Time 1 and Time 2. H2: The condition targeting reduced accountability reduces conformity to cyber aggression compared to the conditions not targeting reduced accountability, both at Time 1 and Time 2. H3: The combination condition (peer group norms + reduced accountability) is most effective at reducing conformity to cyber aggression, compared to the conditions focusing on either single process and the control condition, both at Time 1 and Time 2.

The moderating role of adolescents’ susceptibility to peer pressure and inhibitory control

In examining the effectiveness of the current intervention, it is also important to consider individual differences in adolescents’ social-cognitive development. Differences in adolescents’ social-cognitive development may magnify or mitigate potential intervention effects. Specifically, differences in susceptibility to peer pressure and inhibitory control could play a role. Although adolescents are typically most responsive to peer influence during early adolescence (ages 12–15), some are more susceptible than others [18, 21]. Susceptibility to peer pressure could moderate the intervention effects in two ways. On the one hand, the intervention may work better for adolescents with high susceptibility to peer pressure. Adolescents with high susceptibility to peer pressure typically have difficulties standing up to peers [18, 51], and, thus, might benefit most from an intervention that helps them to stand up to their peers. Contrarily, the intervention may work better for adolescents with low susceptibility to peer pressure. Adolescents with low susceptibility to peer pressure are usually able to resist peer influence [18], but might not yet have learned the right behavioral skills to resist conformity to cyber aggression. Second, we consider how individual differences in inhibitory control may affect the intervention’s effectiveness. Adolescents differ in their ability to inhibit behavioral responses [18]. When inhibitory control is low, adolescents typically have difficulties controlling their reactions to emotional situations [52] such as those involving cyber aggression. Again, this may moderate the intervention effects in two ways. The intervention might work better for adolescents with low inhibitory control, because they may benefit most from an intervention helping them better regulate their behaviors [53]. Then again, the intervention could work better for adolescents with high inhibitory control. Adolescents with high inhibitory control are generally able to inhibit negative behavioral responses [26], but may not yet know how to behave in specific situations that involve cyber aggression. Because susceptibility to peer pressure and inhibitory control may moderate the intervention effects in contrasting ways, we pose the following research question: RQ: How do individual differences in susceptibility to peer pressure and inhibitory control moderate the expected intervention effects?

Method

Design

The study used a 2 (Peer Group Norms: Yes, No) x 2 (Reduced Accountability: Yes, No) factorial between-subjects design with four conditions. We randomly assigned participants to one of the four conditions: (1) peer group norms, (2) reduced accountability, (3) combination, and (4) control. We designed the conditions as online e-learning modules. The e-modules presented information, questions and tasks in a sequential order. At the first measurement directly after the intervention (Time 1), we used a messaging app paradigm and self-report measures to test the direct effects of the intervention. We used the same self-report measures again four weeks later (Time 2) to test the effects at four weeks post-intervention. Unfortunately, the COVID-19 outbreak interrupted data collection. The outbreak led to a national lockdown and closing of all secondary schools in The Netherlands, where we conducted this research. As a result, not all participants could partake at the measurement four weeks post-intervention. Therefore, we tested the direct effects with the complete sample, whereas we tested the effects at four weeks post-intervention only with a partial sample.

Participants

Sample at Time 1

The initial sample included 441 participants. As preregistered, we excluded participants who did not complete all measures (n = 14), who indicated to question the credibility of the messaging app paradigm (n = 6), and who deviated more than 2 standard deviations (SDs) of the mean of the time (in seconds) spent completing this first measurement (n = 44). This resulted in a final sample of 377 participants (53.6% boys, 46.1% girls, 0.3% did not indicate) between 11 and 16 years old (M = 12.99, SD = 0.84). Most participants attended vocational secondary education (53.2%), followed by senior general secondary education (38.3%), and preparatory university secondary education (8.5%).

Sample at Time 2

Due to the COVID-19 outbreak, the government in The Netherlands closed all secondary schools from 16 March 2020 onwards. Due to schools closing, 53.1% of participants (n = 200) could not partake at the second measurement four weeks post-intervention. We further excluded participants who deviated more than 2 SDs of the mean time spent completing this second measurement (n = 10). This resulted in a final sample of 167 participants (51.5% boys, 47.9% girls, 0.6% did not indicate) between 12 and 15 years old (M = 12.96, SD = 0.68). Most participants attended vocational secondary education (58.1%), followed by senior general secondary education (40.1%), and preparatory university secondary education (1.8%).

Procedure

The study received ethical approval of the Ethics Committee Social Sciences of Radboud University (ref. ECSW-2019-138) and we pre-registered it at AsPredicted. The preregistration and anonymized data of the study are available on the Open Science Framework (OSF, https://bit.ly/2SYR1V1). Additionally, data management was in line with the data management protocol of Radboud University. The study took place in February and March 2020 during school hours. We recruited schools through information letters and phone calls. We provided workshops on social media netiquette (i.e., appropriate ways to behave on the internet) for students in return for their participation. We obtained active, written informed consent from schools, legal guardians, and participants themselves before participation. Participants completed the study via Qualtrics (a software program for online experiments) in two in-class sessions on a laptop or desktop PC. The first session (Time 1) lasted approximately 30 minutes and consisted of four parts. First, participants completed a questionnaire containing demographics and questions about their WhatsApp use. Second, participants completed the intervention. Third, participants completed a messaging app paradigm we previously developed to test conformity to cyber aggression [44]. Fourth, participants completed a questionnaire containing self-report measures for conformity to cyber aggression, moderator variables, additional variables (i.e., intervention evaluation measures), and covariates. The second session (Time 2) was conducted four weeks post-intervention and lasted approximately 5 minutes. It consisted of a questionnaire that included the same self-report measures for conformity to cyber aggression used at Time 1. A visualization of the study procedure is displayed in Fig 1.
Fig 1

Study procedure.

Conditions

Peer group norms

To implement the information component in the peer group norms condition, we first informed participants about WhatsApp usage statistics. Adolescents must be able to recognize their behavior as cyber aggression to change it. Therefore, we then had participants read a description of the target behavior. This description included examples of different types of cyber aggression (e.g., impersonation, visual, written-verbal). Subsequently, participants were informed about the influence of peer group norms. Specifically, they learned how and why peer group norms increase conformity to cyber aggression. Finally, we informed participants about the general social norm on cyber aggression: Most people disapprove of cyber aggressive behaviors. We included this information to correct potential misperceptions about the behavior (in case adolescents thought that most peers considered cyber aggression appropriate). To implement the motivation component, participants applied self-persuasion. Self-persuasion is a powerful technique to intrinsically motivate people, because with self-persuasion, people come up with personal arguments for why they would change their behavior. Such arguments are persuasive because they align with people’s attitudes and beliefs [46, 54] and are driven by what an internal source (adolescents themselves) considers to be important as opposed to what external sources (peers, parents, or educators) find important [55]. Specifically, after being taught how peer group norms increase conformity, we asked participants to formulate two arguments for why it was important for them not to conform to cyber aggressive behaviors in messaging apps. To enhance participants’ personal commitment [56], we displayed their self-generated arguments back to them on their screen, and we asked participants to confirm that these were the arguments that were important to them. To implement the behavioral skills component, we instructed participants to formulate an implementation-intention for what they would do if their messaging app group engaged in cyber aggression [48-50]. Implementation-intentions are if-then plans in which people devise an action (the ’then’) for when they find themselves in a particular situation (the ’if’). Implementation-intentions are powerful in helping people regulate their behavior [e.g., 49, 50, 57], because they stimulate people to replace automatic behavior with an alternative automatic response learned in the implementation-intention [48]. Specifically, participants completed the sentence: "If people in my messaging app group act in an unpleasant way towards people outside of the group, then …". To enhance personal commitment, participants’ implementation-intention was displayed on their screen. Moreover, because repetition is central to the effectiveness of implementation-intentions [48], we asked participants to repeat their implementation-intention three times in their head, and type it in once more [57]. Table 1 depicts an overview of how we implemented the three IMB components in each of the intervention conditions.
Table 1

Overview of the Implementation of the IMB components in each intervention condition.

Intervention componentIntervention conditions
Peer group normsReduced accountabilityCombination
Information
General informationBasic information about WhatsApp: (1) it is the most popular platform among Dutch adolescents and (2) 96% of Dutch adolescents uses WhatsApp.Basic information about WhatsApp: (1) it is the most popular platform among Dutch adolescents and (2) 96% of Dutch adolescents uses WhatsApp.Basic information about WhatsApp: (1) it is the most popular platform among Dutch adolescents and (2) 96% of Dutch adolescents uses WhatsApp.
Context 1: target behaviorDescription of the target behavior: on WhatsApp, people sometimes do nasty things because their group members do so.Description of the target behavior: on WhatsApp, people sometimes do nasty things because they feel free to do so.Description of the target behavior: on WhatsApp, people sometimes do nasty things (1) because their group members do so, and (2) because they feel free to do so.
Context 2: examples of target behaviorExamples of cyber aggression on WhatsApp: impersonation, visual, written-verbal, social exclusion.Examples of cyber aggression on WhatsApp: impersonation, visual, written-verbal, social exclusion.Examples of cyber aggression on WhatsApp: impersonation, visual, written-verbal, social exclusion.
Context 3: influence of determinantDescription of the determinant: people value the opinion of their group members on WhatsApp, and, therefore, often do what the others in their group do. People conform to cyber aggressive behavior because they identify with their group members.Description of the determinant: people feel anonymous on WhatsApp, and, therefore, feel more free to do nasty things. People conform to cyber aggressive behaviors because, on WhatsApp, they feel less responsible for their behaviors.Description of the determinant: People conform to cyber aggressive behaviors for two reasons: (1) because they identify with their group members, and (2) because, on WhatsApp, they feel less responsible for their behaviors.
Social normDescription of the general social norm: hardly anyone approves of cyber aggressive behaviors on WhatsApp, but they occur nonetheless.Description of the general social norm: hardly anyone approves of cyber aggressive behaviors on WhatsApp, but they occur nonetheless.Description of the general social norm: hardly anyone approves of cyber aggressive behaviors on WhatsApp, but they occur nonetheless.
Motivation
Self-persuasionSelf-generated arguments: If WhatsApp group members engage in cyber aggressive behaviors, why would you NOT join in? Please formulate 2 reasons for why you would not engage in cyber aggression if your group members do so. Type your reasons in the e-module.Self-generated arguments: If WhatsApp group members engage in cyber aggressive behaviors, why would you NOT join in? Please formulate 2 reasons for why you would not engage in cyber aggression if your group members do so. Type your reasons in the e-module.Self-generated arguments: If WhatsApp group members engage in cyber aggressive behaviors, why would you NOT join in? Please formulate 2 reasons for why you would not engage in cyber aggression if your group members do so. Type your reasons in the e-module.
Commitment enhancementParticipants’ arguments were displayed back to them on their screen and participants had to confirm that these were their self-generated arguments.Participants’ arguments were displayed back to them on their screen and participants had to confirm that these were their self-generated arguments.Participants’ arguments were displayed back to them on their screen and participants had to confirm that these were their self-generated arguments.
Behavioral skills
Implementation-intentionIf-then plan: If WhatsApp group members engage in cyber aggressive behaviors, what would you do? Type your if-then plan in the e-module.If-then plan: If WhatsApp group members engage in cyber aggressive behaviors, what would you do? Type your if-then plan in the e-module.If-then plan: If WhatsApp group members engage in cyber aggressive behaviors, what would you do? Type your if-then plan in the e-module.
Commitment enhancementParticipants’ if-then plans were displayed back to them on their screen, and participants had to confirm that this was their if-then plan.Participants’ if-then plans were displayed back to them on their screen, and participants had to confirm that this was their if-then plan.Participants’ if-then plans were displayed back to them on their screen, and participants had to confirm that this was their if-then plan.
Repetition 1Participants were asked to read and repeat their if-then plan 3 times in their head.Participants were asked to read and repeat their if-then plan 3 times in their head.Participants were asked to read and repeat their if-then plan 3 times in their head.
Repetition 2Participants were asked to type in their if-then plan once more.Participants were asked to type in their if-then plan once more.Participants were asked to type in their if-then plan once more.

Note. Differences in the content between the conditions are underlined and in bold.

Note. Differences in the content between the conditions are underlined and in bold.

Reduced accountability

Also in this condition, we first informed participants about WhatsApp usage statistics. Participants then read a description of the target behavior and learned about different types of cyber aggression. Subsequently, participants learned how reduced accountability increases conformity to cyber aggression. Finally, we informed participants about the general norm on cyber aggression, following the peer group norms condition. By informing participants about and increasing adolescents’ awareness of reduced accountability, we aimed to counteract the potential influence of reduced accountability on conformity to cyber aggression. To implement the motivation and behavioral skills components, participants received the same instructions to apply self-persuasion and formulate an implementation-intention as in the peer group norms condition. However, these instructions now followed the explanation of the reduced accountability determinant instead of the peer group norms determinant.

Combination

The combination condition combined the previously described intervention components. To implement the information, motivation and behavioral skills components of the IMB model, participants learned about the influence of peer group norms and reduced accountability, and formulated personal arguments and an implementation-intention for why they should not conform to cyber aggression on WhatsApp.

Control

In the control condition, participants completed questions and tasks about their social media use to ensure they would spend a similar amount of time on the study as participants in the other conditions. Specifically, we first informed participants about the definition of social media and different platforms (e.g., Instagram, YouTube, Netflix). Participants then answered questions about their social media use frequency, indicated their favorite platform and series on Netflix, and why they favored this platform or series. The control condition was comparable with the other conditions in terms of length, design, number of visuals, number of open/closed questions, and question phrasing.

Measures

Outcome variables

We included several outcome variables to test the intervention effects. We used a messaging app paradigm [44] to assess conformity to cyber aggressive attitudes (i.e., how adolescents judged the appropriateness of cyber aggressive behaviors) and conformity to cyber aggressive intentions (i.e., whether adolescents intended to engage in cyber aggressive behaviors). We previously developed this messaging app paradigm and found it suitable to test conformity to cyber aggressive attitudes [44]. However, we had not yet applied it to cyber aggressive intentions. Because we designed the current study with the intent to change behavior, we assessed both conformity to cyber aggressive attitudes and conformity to cyber aggressive intentions with this messaging app paradigm. Furthermore, we included self-report measures for conformity to cyber aggression. We measured conformity to cyber aggression in the messaging app paradigm by using a scripted conversation (no real discussion) in an online environment visually similar to WhatsApp. We led participants to believe they would have a chat discussion with three peers from their class. We asked participants to indicate to what extent they found several cyber aggressive behaviors appropriate and to what extent they intended to engage in these behaviors. Before providing their answers, participants viewed their ostensible peers’ responses. In reality, we manipulated the ostensible peers’ responses to be positive towards cyber aggression (scores varying from 4 to 6 on a 6-point scale with 6 being most positive towards cyber aggression). The paradigm also included filler items on general media behaviors (e.g., playing a game on your phone). To increase the credibility of the conversation, half of the ostensible peers’ responses on the filler items also included scores from 2 to 4. We used items from the Cybervictimization Questionnaire [CYVIC, 58], assessing the extent to which youths experience aggression through mobile phones or the internet. Previous cyberbullying research has identified four main types of cyber aggression: impersonation (i.e., pretending to be someone else), visual (i.e., photos and videos), written-verbal (i.e., phone calls and comments), and social exclusion [58, 59]. We used 1 item for each cyber aggression behavior. For impersonation; "Impersonating someone else online, as if you are that person", for visual; "Take and disseminate an embarrassing photo of video of someone you know without his or her permission", for written-verbal; "Make fun of someone you know online, by making an offensive comment", and for social exclusion; "Not including a classmate in an online group or not letting him/her join a conversation". We used these 4 items to assess conformity to cyber aggressive attitudes and conformity to cyber aggressive intentions. However, a pilot test for our study showed that using more than 4 target items (where the ostensible peers were positive towards cyber aggression) increased the chances that participants became suspicious about the true goal of the study. Therefore, we only let participants view one item about each type of cyber aggression (either the attitude or the intention item). We presented the target items to participants in a counterbalanced order so that all participants viewed 2 attitude and 2 intention items. To measure conformity to cyber aggressive attitudes, participants indicated to what extent they thought each behavior was appropriate. Response categories ranged from 1 (very inappropriate) to 6 (very appropriate). To measure conformity to cyber aggressive intentions, participants indicated to what extent they intended to engage in the behavior. Response categories ranged from 1 (definitely not) to 6 (definitely). For both measures, we computed a difference score using the absolute difference between the participants’ and the average scores of the ostensible classmates’ responses. We reversed these scores so that higher scores indicated more conformity. The mean and standard deviation of these variables and those of the other key variables in this study are displayed in Table 2.
Table 2

Means and standard deviations of key variables.

Range M SD N
Outcome variables
Experimental conformity to cyber aggressive attitudes0–4]1.681.14353
Experimental conformity to cyber aggressive intentions[0–4]1.821.14362
Self-reported conformity to cyber aggression (Time 1)[1–6]1.670.70377
Self-reported conformity to cyber aggression (Time 2)[1–6]1.480.56167
Moderator variables
Susceptibility to peer pressure[1–6]2.110.91377
Inhibitory control[1–3]1.690.39377
Additional variables
Perceived importance not to conform[1–6]4.141.60377
Perceived ease not to conform[1–6]4.791.18377
Enjoyment of the intervention[1–6]4.200.89377
We also measured self-reported conformity to cyber aggression both directly after the intervention and four weeks post-intervention. We could only use the messaging app paradigm once, directly after the intervention. We could use the messaging app paradigm only once because we had to debrief participants after the first session to ensure that they knew that the peer responses in the WhatsApp conversation were not real. We originally operationalized self-reported conformity to cyber aggression in two ways: (1) self-reported conformity to cyber aggressive attitudes and (2) self-reported conformity to cyber aggressive intentions. To measure self-reported conformity to cyber aggression, we asked participants to what extent they thought that conforming to each of the four cyber aggression behaviors was appropriate (attitudes) and to what extent they intended to conform to each of the four cyber aggression behaviors (intentions). All response categories ranged from 1 to 6, with 6 being most positive towards (intending to engage in) cyber aggression. This operationalization resulted in two measures with 4 items each. However, contrary to what we preregistered, we combined the two measures into one measure. We had three reasons for doing so. First, the items used to measure the two constructs originally stemmed from the same scale. We only adapted the wording to refer to either attitudes or intentions. Second, the correlation between the two constructs was high (.67 at Time 1 directly after the intervention and .62 at Time 2 four weeks post-intervention). The high correlation indicated that, on a methodological level, the items mostly measured the same underlying construct. Third, a factor analysis with all 8 items forced on one factor indicated that all items had acceptable factor loadings (all ≥ .595 at Time 1 directly after the intervention and ≥ .586 at Time 2 four weeks post-intervention). The items also had good reliability (Time 1: α = .85, Time 2: α = .82). Therefore, we combined the two constructs into one measure for self-reported conformity to cyber aggression.

Moderator variables

We measured susceptibility to peer pressure with Santor et al.’s [60] 6-item peer pressure scale. An example item was "My friends can push me into doing just about anything". Response categories ranged from 1 (completely disagree) to 6 (completely agree). The 6 items had acceptable reliability (α = .77). We measured inhibitory control with the 12-item inhibition subscale of the Behavior Rating Inventory of Executive Function [BRIEF; 61]. The Dutch translation of the scale was used [62]. An example item was "I blurt things out". Response categories ranged from 1 (never) to 3 (often). The 12 items had good reliability (α = .84).

Additional variables

We included several additional variables to evaluate whether the self-persuasion and implementation-intentions tasks increased adolescents’ motivation and behavioral skills. These additional variables served as intervention evaluation measures. We operationalized motivation as ‘perceived personal importance not to conform to cyber aggression’, because personal importance is considered a key aspect of motivation to perform behavior [63]. Specifically, we asked participants how important it was for them not to conform to cyber aggression (1 [very unimportant] to 6 [very important]). Furthermore, we operationalized behavioral skills as ‘perceived ease not to conform to cyber aggression’, because the belief in one’s capability to control behavior is often measured by asking people how easy or difficult it is to perform the target behavior [64]. Specifically, we asked participants how easy or difficult it would be for them not to conform to cyber aggression (1 [very difficult] to 6 [very easy]). Finally, we included a general measure for participants’ enjoyment of the intervention. We wanted to know how participants evaluated the intervention because schools could potentially use it in the future. Specifically, we asked participants how (1) interesting, (2) important, (3) fun, (4) useless, and (5) difficult they found the intervention (1 [completely disagree] to 6 [completely agree]). The 5 items had acceptable reliability (α = .64). Items 4 and 5 were reverse coded before computing a mean score for enjoyment of the intervention. A higher score thus indicated a more positive evaluation of the intervention.

Covariates

We included sex, educational level, age, and school year to correct for possible confounding effects. Boys and lower-level students (vocational secondary education) are generally more likely to be involved in cyber aggression than girls and higher-level students [65]. Moreover, older adolescents are more likely to engage in cyber aggression than younger adolescents, likely because adolescents’ online communication access increases as they age [39]. Furthermore, we asked participants how many days per week (one to seven) and hours per day (ranging from 1 [less than half an hour per day] to 9 [more than 7 hours per day]) they used WhatsApp, and how many WhatsApp groups they were a member of (ranging from 1 [1 to 5 groups] to 7 [more than 30 groups]). We included these as covariates, because adolescents’ frequency of media use is a risk factor of cyber aggression [66, 67]. Lastly, we included a measure for the prevalence of cyber aggression in participants’ social environment and a measure for how often participants had managed not to engage in cyber aggression. We controlled for these variables because previous exposure to cyber aggression predicts involvement in cyber aggression [39]. To do so, we asked participants how often in the past 30 days cyber aggression had occurred in their social environment, and how often they had managed not to conform to cyber aggression (1 [never] to 6 [very frequently]).

Results

Preparatory analyses

We analyzed the data in SPSS (Version 25.0). First, we conducted preparatory analyses. We generated descriptive statistics to describe participants’ WhatsApp use and the general prevalence of cyber aggression in their social environment. Due to the hierarchical structure of the data (participants were nested within classes and schools), we then assessed the need to use a mixed-model approach to control for this nested data. We conducted a one-way independent ANOVA and chi-square tests to check whether randomization across conditions had been successful. We discuss the outcomes of these preparatory analyses below.

Descriptive statistics

We computed descriptive statistics for the measures included directly after the intervention (Time 1) and the measures included four weeks post-intervention (Time 2) due to the difference in sample size (see Table 3). Because the descriptive statistics were highly similar at both time points, we report the key statistics of the complete sample (Time 1) here in text. Most participants (99.7%) used WhatsApp. Of these, 98.9% belonged to at least one group on WhatsApp and most often these participants belonged to 1 to 5 active WhatsApp groups (50.8%). Of all participants, 89.1% used WhatsApp every day of the week, mostly one hour per day (34.8%), followed by 30 minutes per day (20.7%), less than 30 minutes per day (18.4%), and the remainder (26.1%) used WhatsApp 3 hours per day or more. Participants indicated that cyber aggression rarely occurred in their social environment (M = 1.97, SD = 0.92) and that, when it occurred, they resisted conforming quite often (M = 4.18, SD = 1.56).
Table 3

Descriptive statistics directly after the intervention (Time 1, N = 377) and four weeks post-intervention (Time 2, N = 167).

Time 1Time 2
Used WhatsApp
No0.3%0%
Yes99.7%100%
Member of a group on WhatsApp
No1.1%0.6%
Yes98.9%99.4%
Number of active WhatsApp groups
00.3%0.6%
1 to 550.8%57.2%
6 to 1033.2%30.2%
11 to 158.3%6.0%
16 to 204.0%4.2%
21 to 251.3%1.2%
26 to 300.5%0.6%
30 or more1.6%0%
WhatsApp use in days per week
7 days89.1%88.6%
6 days3.5%4.2%
5 days or less7.4%7.2%
WhatsApp use in hours per day
Less than 30 minutes per day18.4%18.6%
30 minutes per day20.7%22.7%
1 hour per day34.8%31.1%
2 hours per day13.0%16.8%
3 hours per day8.2%6.0%
4 hours per day2.1%1.2%
5 or more hours per day2.8%3.6%
Prevalence in social environment1.97 (0.92)1.91 (0.85)
Nonconformity to cyber aggression4.18 (1.56)4.32 (1.62)

Clustering of the data

To determine whether it was necessary to control for the nested data in our study, we first identified the most appropriate random effects structure. To do this, we compared the variance in the outcome variables for conformity to cyber aggression explained by (1) class and (2) school to an intercept-only model. We looked at the intraclass correlation (ICC) and a chi-square likelihood ratio test to decide whether it was necessary to include a random intercept for class and school. A random intercept for class and school would be added in a random effects model if the model fit improved significantly as indicated by a statistically significant chi-square likelihood ratio test. Chi-square likelihood ratio tests showed that the variance in neither of the primary outcome measures could be attributed to differences between classes or schools. For all outcome variables (conformity to cyber aggressive attitudes, conformity to cyber aggressive intentions, and self-reported conformity to cyber aggression) the intercepts did not vary significantly across the different classes, all χ (1) ≤ 3.14, all p’s ≤ .076 (all ICC’s ≤ .04), or schools, all χ (1) ≤ 2.83, all p’s ≤ .093 (all ICC’s ≤ .02). Because there was no evidence of variation depending on either class or school, we proceeded to test the hypotheses with general linear modeling [68].

Randomization checks

A one-way independent ANOVA and chi-square tests showed that the four conditions were comparable in terms of age, F(3, 373) = 0.98, p = .403, sex, χ(6) = 5.94, p = .430, and educational level, χ(6) = 2.78, p = .836. This indicated that randomization across conditions was successful.

Analysis of covariance to test the hypotheses

To test the differences between the conditions in the outcome variables we conducted factorial ANCOVAs for each of the primary outcome variables (i.e., conformity to cyber aggressive attitudes, conformity to cyber aggressive intentions, and self-reported conformity to cyber aggression). We entered peer group norms (Yes, No) and reduced accountability (Yes, No) as the between-subjects factors in the ANCOVA model. Moreover, we created interaction terms for susceptibility to peer pressure and inhibitory control with the between-subject factors. We included all covariates discussed in the Methods section of this paper in the models. The results did not show any differences between the conditions on the outcome variables directly after the intervention. There was no statistically significant effect of peer group norms on conformity to cyber aggressive attitudes, conformity to cyber aggressive intentions, or self-reported conformity to cyber aggression, all F’s ≤ 2.78, all p’s ≥ .097, all partial η ≤ .01 (see Table 4 for the mean of each outcome variable in the four conditions and Fig 2 for a visual representation of the differences between the conditions). Therefore, there was no support for H1 at Time 1 directly after the intervention.
Table 4

Means and standard deviations for the outcome variables in each condition directly after the intervention (Time 1) and four weeks post-intervention (Time 2).

Peer group norms
Reduced accountabilityYesNoOutcome variable
Time 1
Yes1.83 (1.18) n = 661.65 (1.16) n = 66Conformity to attitudes in messaging paradigm
No1.80 (1.07) n = 691.81 (1.21) n = 67
Yes1.68 (1.15) n = 711.98 (1.08) n = 68Conformity to intentions in messaging paradigm
No1.96 (1.11) n = 701.85 (1.15) n = 68
Yes1.76 (0.79) n = 731.79 (0.70) n = 71Self-reported conformity
No1.83 (0.68) n = 731.82 (0.70) n = 70
Time 2
Yes1.43 (0.40) n = 391.49 (0.52) n = 32Self-reported conformity
No1.80 (0.85) n = 321.60 (0.51) n = 24
Fig 2

Means for the outcome variables per condition (Error bars representing standard deviations).

There was also no statistically significant effect of reduced accountability on conformity to cyber aggressive attitudes, conformity to cyber aggressive intentions, or self-reported conformity to cyber aggression, all F’s ≤ 1.88, all p’s ≥ .171, all partial η ≤ .007. Thus, there was no support for H2 at Time 1. Furthermore, there was no statistically significant interaction between peer group norms and reduced accountability on conformity to cyber aggressive attitudes, conformity to cyber aggressive intentions, or self-reported conformity to cyber aggression, all F’s ≤ 0.68, all p’s ≥ .411, all partial η ≤ .003. Thus, again, there was no support for H3 at Time 1. Finally, susceptibility to peer pressure and inhibitory control did not moderate the relations for conformity to cyber aggressive attitudes, all F’s ≤ 1.95, all p’s ≥ .164, conformity to cyber aggressive intentions, all F’s ≤ 2.17, all p’s ≥ .142, or self-reported conformity to cyber aggression, all F’s ≤ 3.25, all p’s ≥ .073. To test the hypotheses at four weeks post-intervention, we repeated the analysis for self-reported conformity to cyber aggression, but this time with self-reported conformity to cyber aggression as measured during the second session (Time 2). Again, there was no statistically significant effect of peer group norms on self-reported conformity to cyber aggression, F(1, 106) = 0.32, p = .573, partial η = .003. There was also no statistically significant main effect of reduced accountability on self-reported conformity to cyber aggression, F(1, 106) = 1.24, p = .268, partial η = .012. Furthermore, there was no statistically significant interaction between peer group norms and reduced accountability on self-reported conformity to cyber aggression, F(1, 106) = 1.57, p = .213, partial η = .015. Finally, susceptibility to peer pressure and inhibitory control again did not moderate the relations, all F’s ≤ 2.62, all p’s≥ .109. Therefore, we also did not find support for any of the hypotheses at four weeks post-intervention (Time 2).

Analysis of variance to examine the evaluation of the intervention

The last set of analyses included one-way independent ANOVAs to examine differences between the conditions in how adolescents evaluated the intervention. Specifically, we tested differences between the conditions in perceived importance and ease not to conform to cyber aggression, and enjoyment of the intervention. The analyses’ results showed no differences regarding importance, F(3, 373) = 2.33, p = .075. The peer group norms (M = 3.99, SD = 1.60), reduced accountability (M = 3.85, SD = 1.64), and combination condition (M = 4.39, SD = 1.56) did not increase perceived importance not to conform to cyber aggression compared to the control condition (M = 4.27, SD = 1.53). Moreover, we found no differences regarding perceived ease not to conform to cyber aggression, F(3, 373) = 1.81, p = .146. The peer group norms (M = 4.67, SD = 1.29), reduced accountability (M = 4.86, SD = 1.15), and combination condition (M = 4.98, SD = 1.05) did not increase perceived ease not to conform compared to the control condition (M = 4.65, SD = 1.21). Based on the two measures for motivation and behavioral skills, we can, thus, conclude that the intervention techniques did not affect motivation and behavioral skills to not conform to cyber aggression respectively. Finally, the analyses showed no differences in enjoyment of the intervention between the four conditions, F(3, 373) = 0.04, p = .989. Participants evaluated the peer group norms (M = 4.22, SD = 0.93), reduced accountability (M = 4.18, SD = 0.91), combination (M = 4.21, SD = 0.80), and control condition (M = 4.21, SD = 0.94) equally positively.

Discussion

This study reports a theory-based behavior change intervention specifically tailored to conformity to cyber aggression in early adolescents’ messaging app groups. It is the first intervention effort grounded in recent theoretical insights on conformity to cyber aggression. Contrary to our expectations, we observed no differences between the intervention conditions on conformity to cyber aggression, neither directly after the intervention (all p’s ≥ .097) nor four weeks post-intervention (all p’s ≥ .213). Furthermore, susceptibility to peer pressure and inhibitory control did not moderate the expected relations (all p’s ≥ .073). Finally, the results suggest that the behavior change techniques used in the intervention did not affect adolescents’ motivation (p = .075) or behavioral skills (p = .146). This study does not provide evidence that the behavior change intervention effectively reduces conformity to cyber aggression in early adolescents’ messaging app groups. We discuss explanations for the lack of intervention effects below. A first possible explanation is that it may be challenging to target theoretical mechanisms in applied interventions to change behavior. Previous research points to the theoretical relevance of peer group norms and reduced accountability in predicting conformity to cyber aggression [e.g., 44]. However, it is complicated to disrupt such existing mechanisms in practice. The intervention’s underlying theoretical insights (e.g., peer group norms, reduced accountability) emerged from descriptive studies and experiments. For example, in our previous studies we examined the role of these processes in predicting conformity to cyber aggression. Perhaps it is not possible to manipulate these processes in an intervention. For example, regarding the influence of peer group norms, our findings may demonstrate that it is challenging to counteract existing peer relations in messaging app groups. Perhaps peer group norms play such an important role in adolescents’ daily lives that their perceptions of these norms cannot be easily changed [18, 36]. Moreover, by teaching adolescents about the influence of reduced accountability on conformity, we had hoped to induce some sense of accountability of one’s behavior in online contexts. However, teaching adolescents about the role of reduced accountability may not be sufficient to disrupt this process. Consequently, this may not have led to any changes in behavior. A second potential explanation for why the intervention was ineffective is that the specific techniques we used did not work. The general lack of statistically significant differences between the conditions on the intervention evaluation measures supports this explanation. The intervention conditions did not increase participants’ motivation or behavioral skills (operationalized as perceived importance and ease not to conform to cyber aggression) compared to the control condition. Important here is that participants reported relatively high levels of perceived importance and ease not to conform to cyber aggression overall. It thus seems like participants were already motivated and felt able to resist conformity. Perhaps our intervention could not further increase motivation and behavioral skills. Participants also reported relatively low levels of conformity to cyber aggression and prevalence of cyber aggression in their social environment, which may imply that we targeted behavior that adolescents experience only rarely. It may then be difficult to further reduce such behavior. Nevertheless, even a single instance of cyber aggression (e.g., a private picture shared on social media) can have lasting harmful effects on victims [8]. That even single behaviors can have a lasting impact makes it important to remain committed to reducing conformity to cyber aggression. A third possible explanation might be that the intervention evoked resistance. We stimulated adolescents to make autonomous decisions by applying self-persuasion and implementation intentions. Nevertheless, we explicitly instructed adolescents to perform the self-persuasion and implementation-intention tasks. Perhaps adolescents felt their behavior was driven by an external source (the researchers) rather than by themselves. Previous research has found that feeling obliged to perform a task increases resistance to behavior change [55]. Potentially, this could have cancelled out any intervention effects. However, we did not measure resistance. Therefore, this explanation is only speculative. Based on our findings, we cannot definitively conclude that individual susceptibility to peer pressure and inhibitory control play no role in the effectiveness of interventions that reduce conformity to cyber aggression. Our results suggest that they do not. However, we cannot yet formulate a definite answer to this research question.

Limitations, future research directions, and implications

Before discussing the implications of this study, we address four limitations and suggestions for improvement in future research. The first limitation concerns the potential mismatch between the implementation-intention task and our measure for conformity to cyber aggression. For the situation "If people in my messaging app group act in an unpleasant way towards people outside of the group…" some participants formulated an implementation-intention such as "… then I will mute the group", "… then I will exit the group", or "… then I will take a screenshot of the conversation and show this to my teacher". These are valuable implementation-intentions that help adolescents refrain from conforming to cyber aggression. However, participants could not perform these behaviors in the messaging app paradigm. For example, participants could not use any mute, exit, or screenshot functions. Technical strategies (such as muting the group) may be less complicated for adolescents to undertake in real-life. Such strategies could put adolescents less at risk of social punishment from peers compared to openly diverging from peer group norms [69]. Therefore, we believe that future studies should use an alternative measure for conformity to cyber aggression that better captures all possible responses to cyber aggression. For example, research could include these technical functions in a messaging app paradigm, giving adolescents the opportunity to actually mute a group chat or exit the group. Including these technical strategies may help capture the full breadth of potential responses to cyber aggression in adolescents’ messaging apps. The second limitation concerns the lack of sufficient repetition and opportunity for practice for adolescents’ self-formulated implementation-intention. Through repetition, an implementation-intention can become habitual and lead to behavior change [48, 50, 70]. In our study, participants formulated and wrote down their implementation-intention, repeated it a few times for themselves, and wrote it down again. There was, thus, only little opportunity for repetition. Implementation-intentions also work well when people can practice them by applying them to relevant situations. For example, when students formulate an implementation-intention for how they will complete their homework, it works well to then ask them to do their homework [49]. However, our intervention did not offer adolescents the opportunity to practice their implementation-intention. Therefore, the implementation-intention task may have been too brief to effectively change behavior. Future research could address this by conducting multiple intervention sessions in which participants practice their implementation-intention in several situations involving cyber aggression. This would ensure more repetition and opportunity for practice and could, potentially, improve intervention effectiveness. The third limitation concerns the possibility of sampling bias. We required active consent from participants and their legal guardians for participation in the study. It is possible that (guardians of) participants who were previously involved in cyber aggression–either as a perpetrator or as a victim–were more reluctant to give consent than (guardians of) participants with little or no involvement in cyber aggression. The scores for prevalence of cyber aggression in adolescents’ social environment were also relatively low, which means that the intervention possibly tried to reduce behavior that already occurred only to a small extent in this sample. Therefore, our intervention may not have targeted adolescents who could benefit most from an intervention to reduce conformity to cyber aggression in messaging apps. Future research should aim to draw representative samples from the population that include both adolescents with little or no involvement in cyber aggression and those who were previously a perpetrator or a victim. Research with such representative samples is important, because this might shed light on the effectiveness of interventions for different target populations. Moreover, it would allow for the development of more tailored interventions, where interventions fit participants’ personal characteristics or previous experiences such as cyber aggression involvement [71]. Some research suggests that tailored interventions can be more successful in changing behavior compared to generic interventions [72]. Obtaining a more representative sample could be achieved by informing parents and participants more explicitly that they do not have to share any personal experiences and that their anonymity is guaranteed. Finally, a fourth limitation is that our findings do not account for cultural influence. Recent research shows that cyber aggression is a worldwide phenomenon [73-75]. The mechanisms involved in cyber aggression (such as social identification and reduced accountability) are mostly universal [75, 76]. Yet, the prevalence of cyber aggression likely differs depending on specific learned cultural self-construals [73, 74, 76, 77]. In European cultures for example, people tend to have higher independent self-construal and view themselves as more separate from their social context. Contrarily, in many Asian cultures for example, people typically have higher interdependent self-construal and view themselves as more within a broader social context. Generally, higher independent self-construal is associated with higher involvement in cyber aggression perpetration [73, 74, 76, 77]. Moreover, higher interdependent self-construal is associated with higher perception of social responsibility and better inhibitory control [78]. Because adolescents with higher interdependent self-construal are expected to be already better at inhibiting their behavioral responses, we would expect the current intervention to be more effective for adolescents with a higher independent self-construal. Adolescents with a higher independent self-construal may benefit more from an intervention helping them to better regulate their behaviors. However, our sample only included participants from the same (European) country. Therefore, we cannot examine the role of cultural influence with our data. Our explanations of the potential effects of cultural influence are, thus, only speculative and remain of interest for future research. We recommend future research on conformity to cyber aggression in messaging apps to broaden the scope and compare the effectiveness of interventions cross-culturally. For example, data could be collected and compared in countries with interdependent self-construal cultures (e.g., Egypt, Pakistan, Japan) and independent self-construal cultures (e.g., the United States, Australia, Germany). Comparing these countries could shed light on the most effective intervention design for adolescents with different cultural backgrounds. In conclusion, the findings of our study point to the complex relation between theory and practice: Although the theoretical underpinnings of desired behavior may be evident, manipulating these in an applied intervention can be complex. Our study was a first effort towards doing so. The study limitations and suggested research directions are valuable in informing future intervention efforts to reduce conformity to cyber aggressive behaviors in adolescents’ messaging apps. 23 Dec 2021
PONE-D-21-17000
Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps
PLOS ONE Dear Dr. Bleize, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. Please see reviewer comments below and submit  your revised manuscript by 20th January 2022. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.
Please include the following items when submitting your revised manuscript:
If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols. We look forward to receiving your revised manuscript. Kind regards, Muhammad Shahzad Aslam, Ph.D.,M.Phil., Pharm-D Academic Editor PLOS ONE Journal Requirements: When submitting your revision, we need you to address these additional requirements. 1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf. 2. Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice. [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #1: Yes Reviewer #2: Yes ********** 2. Has the statistical analysis been performed appropriately and rigorously? Reviewer #1: Yes Reviewer #2: Yes ********** 3. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #1: Yes Reviewer #2: Yes ********** 4. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #1: Yes Reviewer #2: Yes ********** 5. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #1: The manuscript is well written, contains detailed description of designed experiments, collected data, statistical evaluation and final explanations. I appreciate that the authors critically reviewed the results, including the fact that the initial hypotheses were not confirmed in the study. Such research is also necessary because it can raise new questions and lead to successive probably more detailed study. The authors should add discussion about cultural influence. Would be the results in another country similar or different depending on cultural and social context? Reviewer #2: The papers presents a very current topic, regarding users online behaviour in messaging apps, where authors proposed an intervention using the Information-Motivation-Behavioral Skills model to counteract cyber aggression. It is unclear how was applied the Information-Motivation-Behavioral Skills model and how it is looks? Which is the mathematical model behind? Which are the variables of the model? The papers presents only the results of the IMB model, but the model description and implementation is lacking. The Conclusion and implications section can be integrated together with study limitations and future research directions. The whole effort seems useless if in Conclusions the authors stated that "the intervention was not successful in reducing conformity to cyber aggression, our study provides important insights and recommendations for the development of future intervention efforts." ********** 6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #1: No Reviewer #2: No [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.
24 Mar 2022 March 24, 2022 Muhammad Shahzad Aslam, Ph.D., M.Phil., Pharm-D Academic Editor PLOS ONE Subject: Revision of manuscript PONE-D-21-17000 Dear dr. Muhammad Shahzad Aslam and reviewers, Please find enclosed our revised manuscript PONE-D-21-17000R1 entitled “Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps”. We greatly appreciate the time and effort that was dedicated to reviewing our manuscript. We thank dr. Muhammad Shahzad Aslam and the reviewers for their thorough review and comments, which were very helpful in improving our manuscript. On the next pages, we specify how we have addressed the reviewers’ comments and we describe the changes we have made. In our response, the reviewers’ comments are numbered, and our responses follow below in blue. The revised manuscript text is displayed in italics, with page numbers for reference. Changes to the references list are indicated at the end of this response letter. Thank you again for your consideration of our revised manuscript. We look forward to your response. Sincerely, on behalf of all authors Daniëlle N.M. Bleize Response to Reviewers’ Comments We were pleased to read that the reviewers valued our study and found the manuscript well-written. The reviewers suggest several revisions to improve our manuscript, which we address on the next pages. Reviewer #1 The manuscript is well written, contains detailed description of designed experiments, collected data, statistical evaluation and final explanations. I appreciate that the authors critically reviewed the results, including the fact that the initial hypotheses were not confirmed in the study. Such research is also necessary because it can raise new questions and lead to successive probably more detailed study. 1. The authors should add discussion about cultural influence. Would the results in another country be similar or different depending on cultural and social context? Author response: We thank the reviewer for this suggestion. Based on recent literature on the role of cultural influence in adolescents’ cyber aggression, we believe that our intervention might be more effective for adolescents from cultures with higher independent self-construal compared to adolescents from cultures with higher interdependent self-construal. We have included two paragraphs in our discussion section that address the potential role of cultural influence and independent versus interdependent self-construals specifically. These paragraphs read as follows: “Finally, a fourth limitation is that our findings do not account for cultural influence. Recent research shows that cyber aggression is a worldwide phenomenon [57-59] and that the mechanisms involved in cyber aggression (such as social identification and reduced accountability) are mostly universal [59,60]. Yet, the prevalence of cyber aggression likely differs depending on specific learned cultural self-construals [57,58,60,61]. In European cultures for example, people typically have higher independent self-construal and view themselves as more separate from their social context. Contrarily, in many Asian cultures for example, people typically have higher interdependent self-construal and view themselves as more within a broader social context. Generally, higher independent self-construal is associated with higher involvement in cyber aggression perpetration [57,58,60,61]. Moreover, higher interdependent self-construal is associated with higher perception of social responsibility and better inhibitory control [62]. Because adolescents with higher independent self-construal are expected to be involved in cyber aggression more often and adolescents with higher interdependent self-construal are expected to be already better at inhibiting their behavioral responses, we would expect that the current intervention is more effective for adolescents with a higher independent self-construal. These adolescents may simply benefit most from an intervention helping them to better regulate their behaviors. Nevertheless, given that the intervention was not effective, we would not currently expect the results to be any different for adolescents with higher interdependent self-construal. However, our sample only included participants from the same (European) country. Therefore, we cannot actually examine the role of cultural influence with our own data. Our explanations of the potential effects of cultural influence are, thus, only speculative and remain of interest for future research.” (p. 31-32, discussion) Reviewer #2 The papers presents a very current topic, regarding users online behaviour in messaging apps, where authors proposed an intervention using the Information-Motivation-Behavioral Skills model to counteract cyber aggression. 1. It is unclear how was applied the Information-Motivation-Behavioral Skills model and how it looks? Which is the mathematical model behind? Which are the variables of the model? The papers presents only the results of the IMB model, but the model description and implementation is lacking. Author response: We thank the reviewer for this remark. We used the Information-Motivation-Behavioral Skills model (IMB model) as a theoretical framework guiding the development of our intervention but did not explicitly test possible causal relationships between the variables of the IMB model. Therefore, we do not specify its mathematical model in our manuscript. However, we do agree with the reviewer that the description of the IMB model and how we implemented this in our intervention can be improved. To address the reviewer’s questions, we therefore made several changes or additions to the manuscript text. First, we explicated that the IMB model principally offers a theoretical approach to develop behavioral interventions and that we used this theoretical approach to guide the development of our own intervention (p. 6-7). Second, we improved the general description of the IMB model by explaining the three key components of the model (information, motivation, and behavioral skills) and how these are interrelated (p. 6-7). Third, we added a figure (Fig 1) of the IMB model as applied to the concepts in our study, with the hope that this better explains how the key components of the IMB model translate to the specific topic of conformity to cyber aggression in our intervention. This figure is included with our resubmission, is referenced in the manuscript text (p. 7), and is displayed below. Finally, we more explicitly described how each component of the IMB model was implemented in our intervention by rephrasing sections throughout the manuscript (p. 7, 11-16, 20). Revisions were made throughout the sections ‘Systematically translating theoretical insights to an applied intervention’, and ‘Testing a behavior change intervention to reduce conformity in messaging apps’ in the introduction section, and throughout the method section (visible in the revised manuscript with changes and indicated with the references to page numbers above). Fig 1. Information-Motivation-Behavioral Skills Model Applied to Conformity to Cyber Aggression. 2. The Conclusion and implications section can be integrated together with study limitations and future research directions. The whole effort seems useless if in Conclusions the authors stated that "the intervention was not successful in reducing conformity to cyber aggression, our study provides important insights and recommendations for the development of future intervention efforts." Author response: As per suggestion of the reviewer, we have integrated the two sections ‘Limitations and future research directions’ and ‘Conclusion and implications’ into one section named ‘Limitations, future research directions, and implications’. We rephrased this section of the discussion, in particular the final paragraph stating the implications of our study. We feel that this paragraph now better reflects how our study contributes to research and practice considering its limitations and suggested directions for future research. The final paragraph now reads as follows: “In conclusion, the findings of this study point to the complex relation between theory and practice: Although the theoretical underpinnings of desired behavior may be evident, manipulating these in an applied intervention can be challenging. Our study was a first effort towards doing so and its limitations and suggested research directions are valuable in informing future intervention efforts to reduce conformity to cyber aggressive behaviors in adolescents’ messaging apps.” (p. 33, discussion) Changes to the Reference List The following references were added to the reference list (no other changes were made): 57. Barlett CP, Gentile DA, Anderson CA, Suzuki K, Sakamoto A, Yamaoka A, et al. Cross-cultural differences in cyberbullying behavior: A short-term longitudinal study. J Cross Cult Psychol. 2014;45(2):300–13. 58. Leung ANM, Wong N, Farver JM. Testing the effectiveness of an e-course to combat cyberbullying. Cyberpsychology, Behav Soc Netw. 2019;22(9):569–77. 59. Kowalski R, Limber SP, McCord A. A developmental approach to cyberbullying: Prevalence and protective factors. Aggress Violent Behav. 2019;45(March–April):20–32. 60. Barlett CP, Seyfert LW, Simmers MM, Hsueh Hua Chen V, Cavalcanti JG, Krahé B, et al. Cross-cultural similarities and differences in the theoretical predictors of cyberbullying perpetration: Results from a seven-country study. Aggress Behav. 2021;47(1):111–9. 61. Wright MF, Kamble S V., Soudi SP. Indian adolescents’ cyber aggression involvement and cultural values: The moderation of peer attachment. Sch Psychol Int. 2015;36(4):410–27. 62. Shapka JD, Law DM. Does one size fit all? Ethnic differences in parenting behaviors and motivations for adolescent engagement in cyberbullying. J Youth Adolesc. 2013;42(5):723–38. Submitted filename: Response to Reviewers.docx Click here for additional data file. 12 Apr 2022
PONE-D-21-17000R1
Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps
PLOS ONE Dear, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. Please submit your revised manuscript by 27 May 2022. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript:
A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'. If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols. We look forward to receiving your revised manuscript. Kind regards, Muhammad Shahzad Aslam, Ph.D.,M.Phil., Pharm-D Academic Editor PLOS ONE Additional Editor Comments (if provided): Kindly write the abstract in a structured manner such as background, objective, methodology, results and conclusion. no need to give these headings but the abstract must be comprehensive. Please provide the heading of the theoretical background and give complete literature in context to the theoretical background. Please provide all hypothesis related to Information-Motivation-Behavioral Skills Model Applied to Conformity to Cyber Aggression. (Fig 1) The abbreviation such as T1 and T2 is meaningless. Please revisit the abbreviations. If you want to use these then please illustrate them in a picture. Please provide an illustration of the study design incomplete manner. Please write the analysis name instead to use the term additional analysis OR Main analyses. Please write the manuscript in a simple way. The manuscript was prepared in a complicated manner and was difficult to read and understand the analysis. Please revisit your figures and provide clear information. [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #1: All comments have been addressed ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #1: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #1: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #1: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #1: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #1: The authors responded to all reviewers´ comments. They clarified the addressed issues. The manuscript reads well. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #1: No [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step. 10 Jun 2022 June 10, 2022 Muhammad Shahzad Aslam, Ph.D., M.Phil., Pharm-D Academic Editor PLOS ONE Subject: Revision of manuscript PONE-D-21-17000R1 Dear dr. Muhammad Shahzad, Please find enclosed our revised manuscript PONE-D-21-17000R1 entitled “Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps”. We appreciate the time and effort that you invested as academic editor to review our manuscript. We thank you for your additional comments to our manuscript. We believe these have helped us greatly in improving our manuscript. Also, we would like to express our gratitude for granting us sufficient time to work on this revision. On the next pages, we outline how we have addressed the comments and we describe the changes we have made. In our response, the comments are numbered and our responses follow below (in blue). The revised manuscript text is in italics, with page numbers for reference. Changes to the reference list are indicated at the end of this response letter. Thank you again for your consideration of our revised manuscript. We look forward to your response. Sincerely, also on behalf of my co-authors, Daniëlle N.M. Bleize Response to Editor Comments 1. Kindly write the abstract in a structured manner such as background, objective, methodology, results and conclusion. No need to give these headings but the abstract must be comprehensive. Author response: We thank the editor for this comment. We agree that the abstract was not fully comprehensive, particularly with regards to the methodology of our study. We have critically revised the abstract and believe that it now provides a better structured overview of our study. Following the editor's comment, we did not include headings in the abstract. However, we rephrased sections of the abstract to more explicitly indicate its structure. For example, we now explicitly state the objective of our study ("…the objective of the current preregistered study was to…", p.2), outline the study procedure ("…participants were first informed about…", p. 2), and include the analysis we used to examine our main hypotheses ("Factorial ANCOVAs revealed that…", p. 2). Moreover, we extended the methodology section of the abstract. We believe that the abstract (p. 2 of the manuscript) now more clearly explains how the intervention was developed and how the IMB model was implemented. 2. Please provide the heading of the theoretical background and give complete literature in context to the theoretical background. Please provide all hypothesis related to Information-Motivation-Behavioral Skills Model Applied to Conformity to Cyber Aggression. (Fig 1) Author response: Following the editor's suggestion, we added a heading for the theoretical background. We revised the introduction and theoretical background and revisited the literature. We conducted a literature search to search for (recent) relevant articles that we might have missed in the previous version of our manuscript. Based on this, we added recent articles as well as some key literature to the theoretical background. Moreover, we extended the explanation of recent empirical findings in the theoretical background (for example regarding our previous experiments, on p. 7 of the manuscript). After careful consideration, we have decided to omit the figure of the IMB model (previously Fig 1) from our manuscript. Fig 1 displayed the IMB-model applied to conformity to cyber aggression. However, we believe that this figure may cause confusion among the reader regarding the objective and design of our study, which we would like to prevent. We designed this intervention based on the IMB principles (that adolescents should be informed, motivated and able to perform behavior). We compared different versions of the intervention and all versions targeted all IMB elements. It was not our goal to measure or actually test the paths of the IMB framework itself. That is, we did not aim to examine the (inter)relations between the IMB elements. Rather, we aimed to compare the presence of such elements in an intervention with the absence of them (control condition). Therefore, we did not have any hypotheses about these relations. Moreover, we also lack the necessary measures to actually test these (inter)relations. We only measured perceived importance and ease to conform to be able to explore how the intervention was evaluated. These served more or less as proxy's for motivation and behavioral skills, but we did not include proper measures for these variables and included no measure for the information element. To prevent confusion regarding our study goals, we therefore consider it best to omit Fig 1 from the manuscript. We revised the description of the IMB framework and its implementation (p. 8-10, 15-20, and 25) to better clarify that we used the IMB framework to guide the development of the intervention conditions, but not to test the paths in the IMB framework itself. 3. The abbreviation such as T1 and T2 is meaningless. Please revisit the abbreviations. If you want to use these then please illustrate them in a picture. Author response: We acknowledge that the abbreviations were not meaningful in the previous version of our manuscript, because we did not specify their meaning before using them. Following the editors' comment, we decided to remove these abbreviations and instead use the terms 'Time 1' and 'Time 2'. In our manuscript we specify that 'Time 1' and 'Time 2' refer to the measurement times directly after the intervention and four weeks post-intervention respectively. We have also adapted these abbreviations in Fig 1 and Fig 2. 4. Please provide an illustration of the study design incomplete manner. Author response: We have revisited all figures submitted with our manuscript, including the figure that displays our study design. We have created a new illustration that displays the study design as well as the study procedure that participants followed. The illustration displays the steps we took in preparing the study, and the two measurement sessions (Time 1 and Time 2) with their respective steps (e.g., questionnaires, intervention, messaging app paradigm). This illustration is displayed in Fig 1 (referred to on p. 15 of the manuscript and enclosed separately with our submission). 5. Please write the analysis name instead to use the term additional analysis OR Main analyses. Author response: Following the editor's suggestion, we changed the headings of the analyses paragraphs in the results section of the manuscript (p. 30 and p. 33). The headings now include the name of the analysis that we conducted. We also identified any mention of the terms 'additional analysis' and 'main analysis' and replaced these with the name of the actual analysis that was used. 6. Please write the manuscript in a simple way. The manuscript was prepared in a complicated manner and was difficult to read and understand the analysis. Please revisit your figures and provide clear information. Author response: We thank the editor for this comment. We have thoroughly rewritten the entire manuscript (see document Revised Manuscript with Track Changes). Some important changes we made include: (1) rewriting sentences from passive voice to active voice, (2) simplifying sentences by converting overly long sentences to shorter sentences, and (3) correcting for grammar and punctuation. In addition, we made many other changes throughout the paper to help the reader's understanding of our manuscript. For example, we revised the results section of the manuscript to clarify our findings. We hope that the manuscript now reads more easily and that the analyses are more clear. Finally, we have revisited our figures. This led to a new illustration for the study design and study procedure (Fig 1) and an updated illustration for the charts that display the means for the outcome variables per condition (Fig 2). Changes to the Reference List The following references were added to the reference list: Cialdini RB, Goldstein NJ. Social influence: Compliance and conformity. Annu Rev Psychol. 2004;55:591–621. Gardella JH, Fisher BW, Teurbe-Tolon AR. A systematic review and meta-analysis of cyber- victimization and educational outcomes for adolescents. Rev Educ Res. 2017;87(2):283–308. Giletta M, Choukas-Bradley S, Maes M, Linthicum KP, Card NA, Prinstein MJ. A meta-analysis of longitudinal peer influence effects in childhood and adolescence. Psychol Bull. 2021;147(7):719–47. Giumetti GW, Kowalski RM. Cyberbullying via social media and well-being. Curr Opin Psychol [Internet]. 2022;45:101314. Hinduja S, Patchin JW. 2019 Cyberbullying data [Internet]. 2019. Available from: https://cyberbullying.org/2019-cyberbullying-data Laursen B, Veenstra R. Toward understanding the functions of peer influence: A summary and synthesis of recent empirical research. J Res Adolesc. 2021;31(4):889–907. Lozano-Blasco R, Cortés-Pascual A, Latorre-Martínez MP. Being a cybervictim and a cyberbully – The duality of cyberbullying: A meta-analysis. Comput Human Behav. 2020;111:106444. Nguyen HTL, Nakamura K, Seino K, Vo VT. Relationships among cyberbullying, parental attitudes, self- harm and suicidal behavior among adolescents: Results from a school-based survey in Vietnam. BMC Public Health. 2020;20(1):1–10. Olthof T, Goossens FA. Bullying and the need to belong: Early adolescents’ bullying-related behavior and the acceptance they desire and receive from particular classmates. Soc Dev. 2008;17(1):24–46. Rudnicki K, Vandebosch H, Voué P, Poels K. Systematic review of determinants and consequences of bystander interventions in online hate and cyberbullying among adults. Behav Inf Technol [Internet]. 2022;1–18. Skilbred-Fjeld S, Reme SE, Mossige S. Cyberbullying involvement and mental health problems among late adolescents. Cyberpsychology. 2020;14(1). Steer OL, Betts LR, Baguley T, Binder JF. “I feel like everyone does it”- adolescents’ perceptions and awareness of the association between humour, banter, and cyberbullying. Comput Human Behav [Internet]. 2020;108:106297. Wegge D, Vandebosch H, Eggermont S, Pabian S. Popularity through online harm: The longitudinal associations between cyberbullying and sociometric status in early adolescence. J Early Adolesc. 2016;36(1):86–107. Submitted filename: Response to Editor Comments.docx Click here for additional data file. 4 Jul 2022
PONE-D-21-17000R2
Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps
PLOS ONE Dear, Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process. Please submit your revised manuscript by August 18, 2022. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file. Please include the following items when submitting your revised manuscript:
A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'. A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'. An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'. If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter. If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols. We look forward to receiving your revised manuscript. Kind regards, Muhammad Shahzad Aslam, Ph.D.,M.Phil., Pharm-D Academic Editor PLOS ONE [Note: HTML markup is below. Please do not edit.] Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #3: (No Response) ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #3: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #3: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #3: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #3: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #3: In the following, there is a list of questions that the authors should answer and concentrate on: 1) In the abstract, this phrase “Our findings point to the complex relation between theory and practice and warrant future research to further examine the effectiveness of intervention tools to reduce conformity to cyber aggression” will make me confused about the meaning. Or it can be revised as “. Our findings point to the complex relation between theory and practice, and these can warrant future research to further examine the effectiveness of intervention tools which could be used to reduce the conformity of cyber aggression and behavioral intervention tools”. Please revised this article again and make it more readable. 2) Please draw these two pictures again, because these two are so blurred. The font should be revised to bigger one. 3) For the Limitation and future research direction part, the limitations are described so readable and obvious, but the future work and feasibility need more details. Especially, for the third limitation, if you could not find the proper participants, is there any alternative plan, for example, collecting data from the third-world countries, or using some mental health scales to avoid aggression trend? 4) In the Conclusion, please attach the p level after the phrase, when you are summarizing the findings. This would become more readable. 5) Considering to change the title. “Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps” would make readers think that this article can give them a practical and useful way to address cyber aggression. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #3: Yes: Cheng Kang ********** [NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.] While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step. 13 Jul 2022 July 13, 2022 Muhammad Shahzad Aslam, Ph.D., M.Phil., Pharm-D Academic Editor PLOS ONE Subject: Revision of manuscript PONE-D-21-17000R2 Dear dr. Muhammad Shahzad Aslam, Thank you for giving us the opportunity to submit a revised draft of our manuscript PONE-D-21-17000R3 entitled “Testing a first online intervention to reduce conformity to cyber aggression in messaging apps” for publication in PLOS ONE. We want to express our gratitude for the time and effort that you and the reviewers dedicated to providing feedback on our manuscript. We thank you for the insightful comments and suggestions for improvement to our manuscript. We have incorporated all of the suggestions made by the reviewers. On the next pages, we outline how we have addressed the suggestions and describe the changes that we made. In our response, the comments are numbered and our responses follow below (in blue). The revised manuscript text is in italics, with page numbers for reference (referring to the submitted document 'Manuscript'). Changes to the reference list are indicated on the final page of this response letter. Thank you again for your consideration of our revised manuscript. We look forward to your response. Sincerely, also on behalf of my co-authors, Daniëlle N.M. Bleize Reviewers' Comments to the Authors: Reviewer 3 1. In the abstract, this phrase “Our findings point to the complex relation between theory and practice and warrant future research to further examine the effectiveness of intervention tools to reduce conformity to cyber aggression” will make me confused about the meaning. Or it can be revised as “. Our findings point to the complex relation between theory and practice, and these can warrant future research to further examine the effectiveness of intervention tools which could be used to reduce the conformity of cyber aggression and behavioral intervention tools”. Please revised this article again and make it more readable. Author response: As suggested by the reviewer, we have revised this phrase in the abstract. The phrase now reads: "The findings from this first intervention effort point to the complex relationship between theory and practice. Our findings warrant future research to develop potential intervention tools that could effectively reduce conformity to cyber aggression." (p. 2) Moreover, we agree with the reviewer's assessment that we can further improve the readability of our manuscript. Accordingly, throughout the manuscript, we made revisions to the text to make it more readable. The revisions include shortening and improving brevity of the manuscript text, eliminating passive voice, clarifications and many other things. We do not include all revisions in this response letter (because they are too many), but the revisions are visible in the submitted document titled 'Revised Manuscript with Track Changes'. 2. Please draw these two pictures again, because these two are so blurred. The font should be revised to bigger one. Author response: Thank you for pointing this out. As suggested by the reviewer, we have redrawn both figures with a bigger font and improved image quality. 3. For the Limitation and future research direction part, the limitations are described so readable and obvious, but the future work and feasibility need more details. Especially, for the third limitation, if you could not find the proper participants, is there any alternative plan, for example, collecting data from the third-world countries, or using some mental health scales to avoid aggression trend? Author response: Thank you for pointing this out. The reviewer is correct that we did not adequately describe the future research directions for the third and fourth limitation. As suggested by the reviewer, we have added the following to the manuscript text to describe the future research directions related to the third limitation (that concerns the possibility of sampling bias): "Future research should aim to draw representative samples from the population that include both adolescents with little or no involvement in cyber aggression and those who were previously a perpetrator or a victim. Research with such representative samples is important, because this might shed light on the effectiveness of interventions for different target populations. Moreover, it would allow for the development of more tailored interventions, where interventions fit participants' personal characteristics or previous experiences such as cyber aggression involvement [71]. Some research suggests that tailored interventions can be more successful in changing behavior compared to generic interventions [72]. Obtaining a more representative sample could be achieved by informing parents and participants more explicitly that they do not have to share any personal experiences and that their anonymity is guaranteed." (p. 31) Furthermore, we have added the following to the manuscript text to describe the future research directions related to the fourth limitation (that concerns the lack of cross-cultural comparisons): "We recommend future research on conformity to cyber aggression in messaging apps to broaden the scope and compare the effectiveness of interventions cross-culturally. For example, data could be collected and compared in countries with interdependent self-construal cultures (e.g., Egypt, Pakistan, Japan) and independent self-construal cultures (e.g., the United States, Australia, Germany). Comparing these countries could shed light on the most effective intervention design for adolescents with different cultural backgrounds." (p. 32) 4. In the Conclusion, please attach the p level after the phrase, when you are summarizing the findings. This would become more readable. Author response: As suggested by the reviewer, we have added the p-levels after the relevant phrases in the conclusion (p. 28). 5. Considering to change the title. “Developing and testing an online behavior change intervention to reduce conformity to cyber aggression in messaging apps” would make readers think that this article can give them a practical and useful way to address cyber aggression. Author response: We think this is an excellent suggestion. We have changed the manuscript title to: "Testing a first online intervention to reduce conformity to cyber aggression in messaging apps". We believe that this title better reflects that we test the effectiveness of a first intervention effort, without implying that this effort was effective and immediately implementable in practice. Changes to the Reference List The following references were added to the reference list: Jacobs NC, Völlink T, Dehue F, Lechner L. Online Pestkoppenstoppen: Systematic and theory-based development of a web-based tailored intervention for adolescent cyberbully victims to combat and prevent cyberbullying. BMC Public Health. 2014;14(396):1–16. Krebs P, Prochaska JO, Rossi JS. A meta-analysis of computer-tailored interventions for health behavior change. Prev Med (Baltim). 2010;51(3–4):214–21. Submitted filename: Response to Reviewer Comments.docx Click here for additional data file. 25 Jul 2022 Testing a first online intervention to reduce conformity to cyber aggression in messaging apps PONE-D-21-17000R3 Dear, We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements. Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication. An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org. If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org. Kind regards, Muhammad Shahzad Aslam, Ph.D.,M.Phil., Pharm-D Academic Editor PLOS ONE Additional Editor Comments (optional): Reviewers' comments: Reviewer's Responses to Questions Comments to the Author 1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation. Reviewer #3: All comments have been addressed ********** 2. Is the manuscript technically sound, and do the data support the conclusions? The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented. Reviewer #3: Yes ********** 3. Has the statistical analysis been performed appropriately and rigorously? Reviewer #3: Yes ********** 4. Have the authors made all data underlying the findings in their manuscript fully available? The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified. Reviewer #3: Yes ********** 5. Is the manuscript presented in an intelligible fashion and written in standard English? PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here. Reviewer #3: Yes ********** 6. Review Comments to the Author Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters) Reviewer #3: I have no more comment for this article and this article now looks more proper to be published on PLOS ONE. ********** 7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files. If you choose “no”, your identity will remain anonymous but your review may still be made public. Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy. Reviewer #3: No ********** 1 Aug 2022 PONE-D-21-17000R3 Testing a first online intervention to reduce conformity to cyber aggression in messaging apps Dear Dr. Bleize: I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department. If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org. If we can help with anything else, please email us at plosone@plos.org. Thank you for submitting your work to PLOS ONE and supporting open access. Kind regards, PLOS ONE Editorial Office Staff on behalf of Dr. Muhammad Shahzad Aslam Academic Editor PLOS ONE
  28 in total

1.  Friendship group identification, multidimensional self-concept, and experience of developmental tasks in adolescence.

Authors:  Mark Tarrant; Liam MacKenzie; Lisa A Hewitt
Journal:  J Adolesc       Date:  2005-09-26

Review 2.  Changing AIDS-risk behavior.

Authors:  J D Fisher; W A Fisher
Journal:  Psychol Bull       Date:  1992-05       Impact factor: 17.737

3.  Age differences in resistance to peer influence.

Authors:  Laurence Steinberg; Kathryn C Monahan
Journal:  Dev Psychol       Date:  2007-11

4.  Cyberbullying definition among adolescents: a comparison across six European countries.

Authors:  Ersilia Menesini; Annalaura Nocentini; Benedetta Emanuela Palladino; Ann Frisén; Sofia Berne; Rosario Ortega-Ruiz; Juan Calmaestra; Herbert Scheithauer; Anja Schultze-Krumbholz; Piret Luik; Karin Naruskov; Catherine Blaya; Julien Berthaud; Peter K Smith
Journal:  Cyberpsychol Behav Soc Netw       Date:  2012-07-20

Review 5.  Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth.

Authors:  Robin M Kowalski; Gary W Giumetti; Amber N Schroeder; Micah R Lattanner
Journal:  Psychol Bull       Date:  2014-02-10       Impact factor: 17.737

6.  Testing the Effectiveness of an E-Course to Combat Cyberbullying.

Authors:  Angel Nga Man Leung; Natalie Wong; JoAnn M Farver
Journal:  Cyberpsychol Behav Soc Netw       Date:  2019-09

7.  A meta-analysis of computer-tailored interventions for health behavior change.

Authors:  Paul Krebs; James O Prochaska; Joseph S Rossi
Journal:  Prev Med       Date:  2010-06-15       Impact factor: 4.018

Review 8.  Cyberbullying via social media and well-being.

Authors:  Gary W Giumetti; Robin M Kowalski
Journal:  Curr Opin Psychol       Date:  2022-02-19

9.  Beyond Homophily: A Decade of Advances in Understanding Peer Influence Processes.

Authors:  Whitney A Brechwald; Mitchell J Prinstein
Journal:  J Res Adolesc       Date:  2011-03-01

Review 10.  Toward understanding the functions of peer influence: A summary and synthesis of recent empirical research.

Authors:  Brett Laursen; René Veenstra
Journal:  J Res Adolesc       Date:  2021-12
View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.