Prevention of Cyberbullying and Cyber Victimization: Evaluation of the ViSC Social Competence Program

It is well-documented that cyberbullying and victimization co-occur with traditional forms indicating that they share similar mechanisms. Therefore, it was hypothesized that the general antibullying program ViSC might also be effective in tackling these new forms of bullying. A longitudinal randomized control group design has been applied to examine the program effectiveness in 18 schools. In total, 2,042 students in Grades 5 to 7 (47.3% girls) aged 11.7 (SD = 0.9) attending 105 classes participated in the study. Utilizing a multiple group bivariate latent change score model controlling for traditional aggression, traditional victimization, and age, results demonstrate program effectiveness for cyberbullying (latent d = 0.39) and cyber victimization (latent d = 0.29) indicating that these behaviors reflect a systemic (school) problem.

[1]  Herbert Scheithauer,et al.  Prävention von Cybermobbing und Reduzierung aggressiven Verhaltens Jugendlicher durch das Programm Medienhelden: Ergebnisse einer Evaluationsstudie , 2014 .

[2]  G. Gredler Bullying in American schools: A social‐ecological perspective on prevention and intervention , 2005 .

[3]  R Core Team,et al.  R: A language and environment for statistical computing. , 2014 .

[4]  Peter K. Smith,et al.  Effectiveness of school-based programs to reduce bullying: a commentary , 2012 .

[5]  M. Eisner,et al.  The Future of Research on Evidence-based Developmental Violence Prevention in Europe – Introduction to the Focus Section , 2012 .

[6]  A. Beelmann Wirksamkeit von Präventionsmaßnahmen bei Kindern und Jugendlichen: Ergebnisse und Implikationen der integrativen Erfolgsforschung , 2006 .

[7]  C. Spiel,et al.  Traditional Bullying and Cyberbullying Identification of Risk Groups for Adjustment Problems , 2009 .

[8]  D. Rubin,et al.  Fully conditional specification in multivariate imputation , 2006 .

[9]  C. Spiel,et al.  Bullying and Victimization in Ethnically Diverse Schools: Risk and Protective Factors on the Individual and Class Level , 2011 .

[10]  Stef van Buuren,et al.  MICE: Multivariate Imputation by Chained Equations in R , 2011 .

[11]  Sunil J Rao,et al.  Regression Modeling Strategies: With Applications to Linear Models, Logistic Regression, and Survival Analysis , 2003 .

[12]  Peter K. Smith Cyberbullying: the European perspective , 2010 .

[13]  C. Spiel,et al.  Evidence-based practice and policy: When researchers, policy makers, and practitioners learn how to work together , 2012 .

[14]  Sonia Livingstone,et al.  Risks and safety on the internet: the perspective of European children: full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries , 2011 .

[15]  R. MacCallum,et al.  Applications of structural equation modeling in psychological research. , 2000, Annual review of psychology.

[16]  A. Demetriou,et al.  A longitudinal study of cyberbullying: Examining riskand protective factors , 2012 .

[17]  G. Hancock Effect size, power, and sample size determination for structured means modeling and mimic approaches to between-groups hypothesis testing of means on a single latent construct , 2001 .

[18]  Dorothy L. Espelage,et al.  Introduction: A Social-Ecological Framework of Bullying Among Youth. , 2004 .

[19]  Stef van Buuren,et al.  Flexible Imputation of Missing Data , 2012 .

[20]  T. Little Longitudinal Structural Equation Modeling , 2013 .

[21]  Robert F. Boruch,et al.  Standards of Evidence: Criteria for Efficacy, Effectiveness and Dissemination , 2005, Prevention Science.

[22]  Christiane Spiel,et al.  ViSC Social Competence Program. , 2012, New directions for youth development.

[23]  L. Haddon,et al.  Risks and safety on the internet: the perspective ofEuropean children. Full findings. , 2011 .

[24]  C. Spiel,et al.  Motives for Bullying Others in Cyberspace , 2012 .

[25]  Ersilia Menesini,et al.  Empowering Students Against Bullying and Cyberbullying: Evaluation of an Italian Peer-led Model , 2012 .

[26]  Christiane Spiel,et al.  Cyber-victimization and popularity in early adolescence: Stability and predictive associations , 2012 .

[27]  Lena Osterhagen,et al.  Multiple Imputation For Nonresponse In Surveys , 2016 .

[28]  T. Little,et al.  Effects of the KiVa Antibullying Program on Cyberbullying and Cybervictimization Frequency Among Finnish Youth , 2013, Journal of clinical child and adolescent psychology : the official journal for the Society of Clinical Child and Adolescent Psychology, American Psychological Association, Division 53.

[29]  Rosario Del Rey,et al.  Knowing, Building and Living Together on Internet and Social Networks: The ConRed Cyberbullying Prevention Program , 2012 .

[30]  Peter K. Smith,et al.  Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.

[31]  S. Perren,et al.  Longitudinal Risk Factors for Cyberbullying in Adolescence , 2013 .

[32]  J. Schafer,et al.  Missing data: our view of the state of the art. , 2002, Psychological methods.

[33]  D. Farrington,et al.  Effectiveness of school-based programs to reduce bullying: a systematic and meta-analytic review , 2011 .

[34]  Robin M. Kowalski,et al.  Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.

[35]  C. Spiel,et al.  National strategy for violence prevention in the Austrian public school system: Development and implementation , 2011 .

[36]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[37]  N. Crick,et al.  Relational aggression, gender, and social-psychological adjustment. , 1995, Child development.

[38]  David P. Farrington,et al.  School-Based Programs to Reduce Bullying and Victimization: A Systematic Review , 2009 .

[39]  D. Badaly,et al.  Longitudinal Associations of Electronic Aggression and Victimization with Social Standing During Adolescence , 2012, Journal of Youth and Adolescence.

[40]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[41]  Sabrina Eberhart,et al.  Applied Missing Data Analysis , 2016 .

[42]  Dagmar Strohmeier,et al.  Nutzung gewalthaltiger Bildschirmspiele als längsschnittlicher Risikofaktor für Cyberbullying in der frühen Adoleszenz , 2014 .

[43]  R. Adorni,et al.  Neural markers of a greater female responsiveness to social stimuli , 2008, BMC Neuroscience.

[44]  Roderick J. A. Little,et al.  Statistical Analysis with Missing Data: Little/Statistical Analysis with Missing Data , 2002 .

[45]  Nicole A. Lazar,et al.  Statistical Analysis With Missing Data , 2003, Technometrics.

[46]  C. Pornari,et al.  Peer and cyber aggression in secondary school students: the role of moral disengagement, hostile attribution bias, and outcome expectancies. , 2010, Aggressive behavior.

[47]  R. Catalano,et al.  Longitudinal predictors of cyber and traditional bullying perpetration in Australian secondary school students. , 2012, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[48]  L. Haddon,et al.  Risks and safety on the internet: the perspective of European children: key findings from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries , 2010 .

[49]  C. Salmivalli,et al.  Counteracting bullying in Finland: The KiVa program and its effects on different forms of being bullied , 2011 .

[50]  Alexander Robitzsch,et al.  Some Additional Multiple Imputation Functions, Especially for'mice' , 2015 .

[51]  Charles A. Maher,et al.  Bullying, Victimization, and Peer Harassment: A Handbook of Prevention and Intervention , 2006 .

[52]  J. Schafer,et al.  A comparison of inclusive and restrictive strategies in modern missing data procedures. , 2001, Psychological methods.