Content uploaded by Kathryn Lynn Modecki
Author content
All content in this area was uploaded by Kathryn Lynn Modecki on Feb 12, 2018
Content may be subject to copyright.
Content uploaded by Kathryn Lynn Modecki
Author content
All content in this area was uploaded by Kathryn Lynn Modecki on Feb 12, 2018
Content may be subject to copyright.
1
Running head: Bullying across contexts.
Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional
bullying.
Kathryn L. Modecki 1, 2; Jeannie Minchin1; Allen G. Harbaugh3; Nancy Guerra4; Kevin
Runions5
1Murdoch University, Australia; 2Arizona State University; 3Boston University;
4University of Delaware; 5University of Victoria
Citation: Modecki, K. L., Minchin, J., Harbaugh, A. G., Guerra, N. G., & Runions, K. C.
(2014). Bullying prevalence across contexts: A meta-analysis measuring cyber and traditional
bullying. Journal of Adolescent Health, 55(5), 602-611.
https://doi.org/10.1016/j.jadohealth.2014.06.007
2
Abstract
Purpose: Bullying involvement in any form can have lasting physical and emotional
consequences for youth. For programs and policies to best safeguard youth, it is important to
understand prevalence of bullying across cyber and traditional contexts.
Methods: We conducted a thorough review of the literature and identified 80 studies that reported
corresponding prevalence rates for cyber and traditional bullying/aggression in adolescents.
Weighted-mean effect sizes were calculated and measurement features were entered as
moderators to explain variation in prevalence rates and in traditional-cyber correlations within
the sample of studies.
Results: Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber
and traditional bullying were highly correlated. A number of measurement features moderated
variability in bullying prevalence; whereas a focus on traditional relational aggression was the
key factor that increased correlations between cyber and traditional aggression.
Conclusion: In our meta-analytic review, traditional bullying was twice as common as cyber
bullying. Cyber and traditional bullying were also highly correlated, suggesting that poly-
aggression involvement should be a primary target for interventions and policy. Results of
moderation analyses highlight the need for greater consensus in measurement approaches for
both cyber and traditional bullying.
Implications and contribution summary statement: To safeguard youth against harmful effects
from bullying, policies and programs require a clear picture of prevalence across on-line and off-
line contexts. Meta-analytic findings indicate cyber bullying is considerably less prevalent than
traditional bullying and they are highly correlated. Interventions should focus on reducing
malicious behaviors wherever they occur.
3
Bullying prevalence across contexts: A meta-analytic review of studies measuring cyber and
traditional bullying.
Scholars have long recognized that prevention of youth aggression and bullying is a
major public health issue (Olweus & Limber, 2010). Over the last decade, research emphasis has
shifted to the prevention of aggression on-line, where adolescents can both bully and be
victimized (e.g. Erdur-Baker, 2010; Juvonen & Gross, 2008). Data from published studies have
helped illustrate that bullying involvement, either on- or off-line, adversely affects youth
adjustment (Copeland et al., 2014; van Geel, Vedder, & Tanilon, 2014). The realization that
bullying in any context can have lasting physical and emotional consequences has lead parents,
educators and policy makers to embrace intervention efforts, and there is now substantial
educational and clinical interest in programs that help to mitigate bullying’s harmful outcomes
(Olweus & Limber, 2010; Williford et al., 2013). In an effort to better understand the relative
prevalence of on-line and off-line bullying, a growing body of research has examined both in the
same study, yielding evidence useful for designing prevention efforts (see Olweus, 2012; 2013).
However, these studies present mixed findings and vary in their approaches to measurement and
methodological rigor. As a result, scholars lack a clear picture of the extent of the bullying
problem on-line relative to off-line, and how measurement approaches influence reported figures.
In order for policies and programs to safeguard youth against detrimental consequences
from bullying, it first is crucial to delineate the settings in which bullying occurs. Unfortunately,
although numerous studies have examined prevalence of cyber bullying and related constructs
(e.g. cyber aggression, electronic aggression), and a sub-set of work has contrasted prevalence of
cyber bullying with traditional bullying and related constructs (e.g. relational aggression, verbal
aggression), the extent to which adolescents differentially engage in aggression across on-line
4
and off-line contexts remains ambiguous. In the current meta-analysis, we take stock of findings
to date to understand prevalence rates of both modes of bullying within the context of one
another (Olweus, 2012; 2013). We use the general term “bullying” to describe harmful behaviors
that occur in both cyber and non-cyber contexts, because in practice the distinction between
bullying/aggression labels is not always clear (Finkelhor et al., 2012). Consequently, an
expansive set of behaviors must be captured to empirically distill the literature on harmful
behaviors that occur on- and off-line (Cook et al., 2010). Moreover, whether variability in
prevalence rates is partially due to differences in measurement and/or operationalization of the
bullying/aggression construct remains an empirical question (e.g. Cook et al. 2009; Ybarra et al.,
2012). For example, explicit references to bullying and bullying definitions likely influence study
results (Cook et al., 2009), and these and other measurement factors are considered as moderators
that may help explain variability in rates across studies.
On-line harm towards others has been captured under a broad array of terms including
internet harassment (Ybarra, Diener-West, & Leaf, 2007), internet bullying (Law et al., 2012),
internet aggression (Werner, Bumpus, & Rock, 2010), and cyber bullying (Smith et al., 2008).
Whatever label scholars choose, adolescents likely deploy a core set of behaviors to intentionally
harm others on line (Rivers & Noret, 2010). The prevalence of these behaviors, though, is
inconsistent. Illustratively, rates in the literature for cyber perpetration have ranged from 5.3% to
31.5% (Gradinger et al., 2009; Pornari & Wood, 2010), and for cyber victimization have ranged
from 2.2% to 56.2% (Perren et al., 2010; Pornari & Wood, 2010). Investigations in this arena are
particularly important, because even relatively small prevalence rates may belie harmful effects.
An accumulating body of research suggests concerns about harmful effects of bullying may be
magnified for aggression that transpires on-line (van Geel et al., 2014).
5
Variability in prevalence rates is not confined to studies of on-line behavior. There are
also wide differences in rates of traditional bullying among studies comparing prevalence of on-
line and off-line behavior. For instance, rates of traditional bullying perpetration have ranged
from 9.68% to 89.6% (Perren et al., 2010; Pornari & Wood, 2010) and there are similar
discrepancies for bullying victimization: 9% to 97.9% (Slonje & Smith, 2008; Pornari & Wood,
2010). As a result of these variations, the pervasiveness of both on-line bullying and off-line
bullying is difficult to ascertain. What could account for such divergent estimates?
Inconsistencies in measurement have featured strongly in explanations of disparate
prevalence rates for both cyber and traditional aggression, and scholars have called for greater
consensus in definition and measurement (Cook et al., 2009; Tokunaga, 2010; Ybarra et al.,
2012). Definitions of bullying vary widely, and not all researchers endorse the most widely cited
characterization of bullying: harmful, repetitive behaviors enacted by a perpetrator who is more
powerful than his or her victim (Olweus, 2012; 2013; Vaillancourt et al., 2008). Definitions of
cyber bullying are particularly controversial and some scholars question the relevance of
imposing these three bullying criteria on the technological realm (Runions et al., 2013; Wolak,
Mitchell, & Finkelhor, 2007). Still, the effect of including a definition on prevalence is
inconclusive (e.g. Espelage & Swearer, 2003). In one experimental study, providing a definition
had no effect on either on-line or off-line victimization rates (Ybarra et al., 2012). However,
several other studies show definitions do affect traditional prevalence rates, increasing
perpetration rates but decreasing victimization rates (Cook et al, 2009; Vaillancourt et al, 2008).
Measurement features may also help to account for variation in figures. First, researchers
operationalize bullying many different ways. Some scholars include behavioral examples thought
to characterize bullying (e.g. “have you posted mean messages on-line ”) and others evoke
6
implicit definitions (e.g. “have you bullied someone over the internet?” or “have you made fun of
or teased someone on-line”) (Cook et al, 2009; Ybarra et al, 2012). Behavioral examples may
create false positives by priming a broad array of experiences that fall beyond the definition of
bullying (Ybarra et al., 2012). Alternatively, youth may discount experiences that fail to align
with provided examples, and behavioral descriptors could produce lower bullying figures (Cook
et al., 2010). The complexity of measuring bullying is further muddied by use of the very term
“bully”, which may decrease reported prevalence (Cook et al., 2009; Ybarra et al.), and use of
behavioral descriptors such as “made fun of”, and “tease”, without highlighting an explicit
intention to harm, which may increase prevalence (Vaillancourt et al., 2008; Vandebosch & Van
Cleemput, 2009). Finally, sampling bias poses a general challenge to community-based research
and may lead to distorted estimates of prevalence (Olweus & Alsaker, 1991). Thus an analysis of
convenience versus random samples may help to explain variability in rates across studies.
The degree of correlation between on-line and off-line aggression involvement is also of
considerable translational significance and accordingly, has generated substantial scholarly
discussion (e.g. Olweus, 2012; Salmivalli, Sainio, & Hodges, 2013). Evidence of strong
correlations bolsters arguments that policy and interventions should focus on poly-aggression
involvement, targeting how youth treat each other on- and off-line to reduce malicious behaviors,
generally (e.g. Wang, Iannotti, Luk, & Nansel, 2010). Weak correlations, conversely, intimate
technology has expanded the population of aggression-involved youth, and suggest cyber-
focused interventions are a more useful public-health approach. Unfortunately, not unlike studies
of prevalence, the literature characterizing overlap in cyber and traditional bullying is marked by
heavy variation. Illustratively, some studies identify relatively weak correlations between cyber
and traditional involvement, and suggest technology may be galvanizing a new breed of
7
aggressive perpetrators and/or victims (Dempsey et al., 2009; Ybarra & Mitchell, 2004). Other
studies report very strong correlations (Dempsey et al., 2011; Olweus, 2012), supporting
interventions that target harmful behaviors generally, including but not limited to the cyber
environment.
Just as for prevalence, disparate measurement approaches may account for some of the
variation in correlations reported across studies. For instance, type of traditional aggression likely
impacts correlations, and relational aggression and cyber aggression may be especially
concomitant (e.g., Hemphill et al., 2010). Further, many traditional bullying scales investigate
behaviors specific to the school-environment by measuring bullying “at school” or by “students”
(Turner et al., 2011). Distressing on-line interactions can occur with school-based peers, but can
also occur with peers known only through on-line contact, and with complete strangers (Wolak et
al., 2007). Thus studies examining traditional bullying “at school” may describe less
correspondence between traditional and cyber bullying than studies examining traditional
bullying within a wider landscape. Conversely, measures that narrowly probe cyber incidents
with “students” or originating “at school” may yield higher correlations (Agatston et al., 2007).
Finally, just as for prevalence, sampling bias may affect apparent overlap between cyber and
traditional aggression, and needs to be accounted for in considering variation in correlations
across studies.
In all, these discrepancies are important because policy-makers, schools, and parents are
hungry for information about where to intervene with youth to diminish their harmful behavior
involvement (Sabella et al., 2013). Before translating findings for advocacy and intervention, it is
crucial to first present accurate estimates regarding the extent of the problem and to demonstrate
how varying concepts and measures influence results. In an effort to provide a starting point and
8
create a context for the literature to date, we conducted a meta-analysis of research measuring
both cyber and traditional bullying in adolescents. Eighty studies reported prevalence rates for
cyber and traditional perpetration, for cyber and traditional victimization, or for all four types of
bullying. Following best practice recommendations from Lipsey and Wilson (2001) we coded
and analyzed studies that together provide a sample of 335,519 youth, to estimate mean
prevalence rates and identify the degree of overlap between cyber and traditional bullying across
studies. Further, we examined whether study features accounted for systematic variability in
prevalence rates and correlations across studies.
Methods
Study selection. We employed several methods to locate possible eligible studies. First,
we conducted a database search using PSYCInfo, PubMed, Educational Resources Information
Centre (ERIC), Proquest Dissertations and Theses, Scopus, and Google Scholar entering a
combination of the following keywords: adolescent, juvenile, teenage, bully, victim, perpetrator,
aggression, cyber, on-line, internet, text, and electronic. To decrease publication bias, we
included dissertations and theses. Finally, we reviewed the reference list of each located article
for studies that could potentially be included in our sample. We limited the studies in our
analyses to those that met the following inclusion criteria: written in English; included an
adolescent sample (age range including at least some youth ages 12-18); was self-report with a
recall period immediately preceding data-collection; reported concurrent prevalence rates for
both cyber and traditional bullying; focused on peer (not sibling) bullying; and was not based on
a unique sub-set of youth (e.g. deaf youth). Our original search drew 1,951 studies, and from the
articles originally identified, our final sample consisted of 80 studies that were coded for study
and measurement level effects. Supplementary Table 1 specifies our decision steps for study
9
exclusion and Supplementary Table 2 outlines the 87 studies that were excluded based on a full
document search.
Study coding. First, the first and second authors created a provisional coding form and
manual. Next, they independently pilot-coded five studies, and then revised the coding criteria
based on any identified issues. These same articles were re-coded at the end of study, with
perfect test-retest reliability. After pilot testing, the same researchers independently coded all of
the studies, with a 98% agreement rate between coders. When coding information was missing or
unclear, we contacted the study’s primary author to request the required information. Because we
were primarily interested in the moderating effect of measurement, where possible, we located
the specified instrument from each study to verify definitions, wording, and items. Further,
because sample representativeness arguably affects prevalence estimates, we coded for whether
researchers introduced a degree of randomness into their protocol, such as random-digit dialing,
or randomly selecting classes within schools.
Statistical analyses. We used fixed effects models for several reasons. First, we aimed to
understand variability in prevalence rates across existing studies, rather than extrapolate to a
wider population of studies that may not have been included in the analysis. Particularly because
cyber bullying is an emerging area of study, we deemed this a reasonable assumption. Further,
too much between-study variation results in under-powered random effects models, and given the
wide-range in prevalence rates across studies, we presumed that random error would make it
particularly difficult to detect small to moderate moderator effects. Nonetheless, we tested this
last assumption by running exploratory random effects analyses.
Prevalence rates. We divided all prevalence rates by 100, resulting in proportion
estimates for each dependent variable. Only one prevalence rate was recorded for each dependent
10
variable within each study, to avoid violating independence assumptions. Because calculating an
effect size directly from a proportion underestimates the confidence interval around the mean, we
converted each proportion to a logit using a log transformation (Lipsey & Wilson, 2001). For
each dependent variable, we computed a weighted mean effect size so that studies based on
larger samples were given more weight than those based on smaller samples (Lipsey & Wilson,
2001). Results were transformed back to proportions from logits for ease of interpretation.
Degree of association. Effect sizes for degree of association between cyber and
traditional aggression were represented using Pearson correlations. We converted Spearman’s rho
and Kendal’s tau to Pearson’s r values based on Gilpin (1993) and used beta-coefficients to
estimate correlation coefficients based on Peterson and Brown (2005).
Differences in prevalence rates. To compare whether each moderator variable was more
strongly associated with either cyber or traditional aggression, we calculated Z values using the
standard formula:
z = B1 – B2
se(B1)2 + se(B2)2
The Z values, which can be thought of as beta weights for each independent variable, controlled
for other independent variables in the model.
Results
Mean prevalence rates. As described in the top-half of Table 1, cyber bullying was less
prevalent than non-cyber (traditional) bullying across both perpetration and victimization. The
sample-size weighted mean prevalence rates across contexts were remarkably similar for cyber
perpetration (16; 95% CI: .15-.16) and victimization (.15; 95% CI: .15-.15), and for traditional
perpetration (.35; 95% CI: .34-.35) and victimization (.36; 95% CI: .36-.36). Cochran’s Q
statistics, calculated to assess homogeneity of the effect sizes for each dependent variable and
11
following a chi-square distribution, indicate substantial variability in prevalence rates across all
four outcomes. Figure 1 displays the prevalence rates graphically in the form of proportion of
youth reporting being a perpetrator and Figure 2 graphically displays proportion of youth
reporting being a victim. Notably, examination of the pattern of study findings across both
figures reveals that the majority of studies report higher offline rates than on-line rates.
Prevalence-moderator effects. The bottom-half of Table 1 describes the results of
moderator analyses focusing on measurement effects. It is noteworthy that almost all of the
measurement effects influenced both cyber and traditional aggression in the same direction.
However, there are clear differences in the strength of measurements effects on cyber and
traditional aggression, and the pattern of strength differences are nearly identical across
perpetration and victimization.
Beginning with the first listed predictor (middle of Table 1), results indicate that using a
definition with a clear reference to intent to harm, repetition, and power imbalance, is related to
higher prevalence rates for both cyber and traditional bullying, though the effect is stronger for
traditional than for cyber. Further, providing respondents with behavioral examples is generally
linked with lower prevalence estimates, with one exception. Behavioral examples are associated
with higher traditional perpetration rates.
Working downward on the table, results demonstrate that including the term “bully” is
related to lower prevalence rates for all four aggression indices, though the effect is stronger for
cyber than for traditional bullying. Inclusion of the term “fun” or “tease” shows an opposite
pattern and is associated with more prevalent aggression, with a stronger effect for traditional
than cyber bullying. Finally, randomization is associated with lower prevalence rates across the
12
four dependent variables, though the negative effect of researcher-imposed randomization is
stronger for cyber than for traditional aggression.
Mean degree of association between cyber and traditional bullying. Described at the top
of Table 2, the sample-size weighted mean correlation between cyber and traditional perpetration
across studies was 𝑟 = .47 (95% CI: .47-.47), and the association between cyber and traditional
victimization was 𝑟 = .40 (95% CI: .40-.41). These results indicate a moderately strong
association. Again the Q statistics indicate a great deal of variability in degree of association
between cyber and traditional bullying across studies. The correlations are displayed graphically
in Figure 3. The pattern of study findings reveals that the correlations between cyber and
traditional perpetration are generally higher than those between cyber and traditional
victimization.
Correlation-moderator effects. The bottom of Table 2 describes moderator effects on the
degree of association between cyber and traditional aggression. Accounting for the range of
estimated correlations within these models, the positive coefficients indicate a stronger degree of
association and the negative coefficients indicate a weaker degree of association between cyber
and traditional bullying. Thus, focusing on perpetration (bottom left side of Table 2), associations
based on relational perpetration have stronger correlations between cyber and traditional bullying
(Z = .84; 𝑟 = .69), whereas associations based on general traditional bullying or other bullying
subtypes have relatively weaker, though still positive associations (intercept; Z = .48; 𝑟 = .45).
Further, studies based on school-centered traditional perpetration report weaker correlations (Z =
.41; 𝑟 = .39) relative to studies that do not focus on school-based traditional perpetration
(intercept; Z = .48; 𝑟 = .45). Studies with some degree of researcher-imposed randomization also
13
report weaker, though still positive associations between cyber and traditional perpetration (Z =
.37; 𝑟 = .35).
The bottom right side of Table 2 describes moderator effects on the correlation between
cyber and traditional victimization. Only relational victimization significantly impacted the
correlation. Specifically, traditional relational measures have stronger, positive correlations
between cyber and traditional victimization (Z = .65; 𝑟 =.57) than do traditional measures that
are not strictly based on relational victimization (intercept; Z = .32; 𝑟 = .31).
Exploratory analyses. Our final set of analyses was exploratory and examined whether
effects would hold under the more conservative random effects models. There were only small
differences in prevalence rates when comparing fixed and random effects models. Finally,
random effects analyses (available upon request) resulted in few statistically or substantively
meaningful moderator effects. There appeared to be too much random variability in prevalence
rates between studies for moderators to systematically explain their variance.
Discussion
Summary. This meta-analysis is the first to take stock of the literature on prevalence of
cyber relative to traditional bullying. In so doing, we found that in the context of studies that
have measured both forms of aggression to date, cyber bullying was far less prevalent, with rates
that are less than half those of traditional bullying. Moreover, the pattern of study findings was
consistent both within and across studies; the majority of studies reported higher offline rates
than on-line rates. These trends have recently been implied, but not yet tested empirically across
existing studies (Olweus, 2012; Salmivalli et al., 2013). Correlations between traditional and
cyber bullying were also relatively strong, and when relational aggression was considered, the
associations between on-line and off-line bullying were particularly robust. Findings suggest that
14
cyber and traditional measures may reflect different methods of enacting a similar behavior
(being mean to others) and the form (on-line versus off-line) of bullying may be less important
than the conduct (Williams & Guerra, 2007).
Prevalence and moderator effects. Across eighty studies that report rates for cyber and
traditional perpetration, cyber and traditional victimization, or both, we found mean prevalence
rates of 35% for traditional bullying involvement and 15% for cyber bullying involvement.
Consistent with our pattern of findings, Olweus (2012) found that cyber bullying was
considerably less prevalent than traditional bullying within large samples from the US and
Norway. Our findings are also consistent with research generated by Salmivalli and colleagues
(2013), who found that cyber bullying was far less prevalent than traditional bullying within their
KiVa data. Based on disparate prevalence rates, these scholars have asserted that interventions
should not shift attention from traditional to cyber settings. Our findings are consistent with this
hypothesis and suggest interventions that exclusively target cyber contexts are neglecting a
highly salient setting for preventing youthful bullying, at least in terms of prevalence. However,
we maintain that rather than focusing on the setting (e.g. on-line versus off-line) of bullying,
efforts to prevent detrimental effects of bullying may be best served by instead focusing on the
behavior of bullying—working to reduce harmful conduct wherever it occurs (Williams &
Guerra, 2007; Williford et al., 2013).
David-Ferdon and Hertz (2007) noted previously, and our results substantiate, that
measurement factors systematically drive variability in cyber bullying prevalence rates. Notably,
similar measurement dimensions also moderated traditional perpetration results, in the same
direction and often with stronger effects. For example, including a definition with three main
bullying criteria (intentionality, repetition, and power-imbalance) increased prevalence across all
15
four outcomes. It may be that without a definition, youth conjure aggressive incidents such as
physical fighting (Vaillancourt et al., 2008), which are less common than bullying (Nansel et al.,
2003). In contrast, behavioral examples decreased prevalence for three of four outcomes. One
interpretation of this negative effect is that examples help to further clarify and encapsulate
bullying definitions (Vaillancourt et al., 2010). An alternative interpretation is that youth are
under-reporting harmful incidents because behavioral examples are not representative of
adolescents’ experiences (Card, 2013). Further research is needed to reconcile these different
interpretations.
A number of other measurement features also moderated prevalence rates and in expected
directions. For example, use of the term “bully” also produced lower prevalence rates across
outcomes, and this effect was particularly strong for cyber aggression. Conceivably, the term
“bully” and its associated negative implications may deter youth from conceptualizing their
involvement as such (Guerra et al., 2011), and this hesitancy may be especially salient for cyber
aggression. Not surprisingly, the use of terms such as fun/tease increased rates across outcomes;
perpetrators and victims may be unsure how to characterize ambiguous behaviors such as teasing
or poking-fun (Guerra et al.). Notably, whether or not researchers imposed any randomization
was one of the stronger predictors of prevalence. Randomization lead to lower prevalence and
this effect was particularly strong for cyber aggression. These findings highlight a need for
random rather than convenience samples within the field.
Cyber and traditional correlations and moderator effects. Many previous studies have
measured cyber and traditional aggression, but ignored the overlap between the two (Salmivalli
et al., 2013). We identified mean correlations between cyber and traditional bullying across
studies to date and characterized measurement features that help to account for this relation. Our
16
meta-analytic results indicate fairly high correspondence between cyber and traditional
perpetration (𝑟 = .47) and between cyber and traditional victimization (𝑟 = .40). The associations
between on-line and off-line aggression were also heavily influenced by type of traditional
aggression in the model and correlations based on traditional relational aggression were
particularly strong, perpetration (𝑟 = .69) and victimization (𝑟 = .57).
These findings suggest more behavioral similarities across on-line and off-line settings
than differences. What we can infer from this heavy overlap is that focusing exclusively on cyber
contexts may not be the optimal approach to reducing harmful behaviors among youth. Instead,
interventions should target how youth treat each other to reduce cruelty and meanness and
increase respectful and positive behaviors, generally, across settings (Salmivalli et al., 2013). Of
course, on-line and off-line bullying were not perfectly correlated and certain new victims may
stem from the on-line environment. There could be many explanations for this, including access
to internet, cell phones, or the ease of cyber communication and its lack of personal cues (Li,
Smith, & Cross, 2012). More typically, however, youth who are involved in cyber bullying are
also involved in traditional bullying.
Only a few other measurement features influenced the degree of association between
cyber and traditional bullying, and these features affected only perpetration, not victimization.
First, because cyber bullying can involve non-school based peers (Turner et al., 2011), we
hypothesized that school-based traditional instruments might diminish correspondence between
cyber and traditional bullying. As expected, school-based measures decreased overlap for
perpetration, though the effect was weak. Second, sampling bias is a practical concern for
community-based research and we hypothesized that researcher-imposed randomization would
affect correspondence between cyber and traditional bullying. Consistent with this notion,
17
researcher-imposed randomization functioned to decrease overlap in perpetration, though again
this effect was small. These results again underscore the need for random rather than convenience
samples within the literature.
Limitations. Our findings must be considered in light of the study’s limitations. First, only
a subset of studies within the larger literature reported both cyber and traditional bullying
prevalence (n = 80). Because of large between-study variance, we used fixed effects analyses, so
that results must be interpreted only within the context of studies in our sample. As the literature
grows, we encourage further meta-analytic work based on larger samples under a random-effects
model.
It is also worth considering whether traditional estimates describe harmful behaviors that
occur solely off-line. It is possible that, lacking qualifiers to designate off-line events, some
traditional assessments may capture malicious actions that occur on-line. However, this potential
bias may be less likely within our data, because we examined studies that considered both types
of bullying and youth may have been primed to consider these behaviors separately.
Finally, concerns about cyber bullying’s prevalence are magnified by worries about its
particularly deleterious consequences. Illustratively, one recent meta-analysis indicates cyber
bullying represents a particularly problematic mental health risk for victims (van Geel et al.,
2014). This meta-analysis cannot speak to the different effects of cyber relative to traditional
bullying. Nor can results address whether putative mediators of change are similar for both types
of behaviors (e.g. Modecki et al., 2013; Williford et al., 2013). Rather, our findings anchor
prevalence estimates across studies to describe the contexts in which bullying occurs, and further
meta-analytic research must address antecedents and outcomes of both types of bullying.
18
Implications for policy and prevention. This is the first study to undertake a systematic
review of the literature to uncover mean prevalence rates for cyber relative to traditional bullying.
In doing so, we find that cyber bullying is far less prevalent than traditional bullying.
Notwithstanding bullying within the on-line environment may have particularly pernicious
effects on adolescent’s health (van Geel et al., 2014), their involvement in this phenomenon
remains less common at present. Moreover, cyber and traditional aggression were highly
correlated, indicating that youth are similarly involved in aggression across on-line and off-line
contexts. The implication of this relatively heavy overlap is that the form of communication may
be less important than the behavior itself. Given that traditional bullying is more widespread than
cyber bullying, and given the heavy overlap between both forms of aggression, policies and
programs may be best served by improving overall functioning in youth engaged in aggression or
bullying more broadly, rather than focusing on hurtful behaviors that occur within a specific
setting (Olweus, 2013; Salmivalli et al., 2013).
19
References
*References marked with an asterisk indicate studies included in the meta-analysis.
Agatston, P. W., Kowalski, R., & Limber, S. (2007). Students’ perspectives on cyber bullying.
Journal of Adolescent Health, 41(6), S59-S60.
*Bauman, S., Toomey, R. B., & Walker, J. L. (2013). Associations among bullying,
cyberbullying, and suicide in high school students. Journal of Adolescence, 36(2), 341-350.
*Beckman, L., Hagquist, C., & Hellström, L. (2012). Does the association with psychosomatic
health problems differ between cyberbullying and traditional bullying?. Emotional and
Behavioural Difficulties, 17(3-4), 421-434.
*Bohn, C. M. (2011). Predicting bullying among high school students using individual and
school factors: Analysis of a national survey. (Order No. 1490789, Utah State University).
ProQuest Dissertations and Theses, , 91. Retrieved from http://0-
search.proquest.com.prospero.murdoch.edu.au/docview/862345586?accountid=12629.
(862345586).
*Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: above and
beyond the impact of traditional forms of bullying. Journal of Youth and Adolescence,
42(5), 685-697.
*Bradshaw, C. P., Waasdorp, T. E., & O’Brennan, L. M. (2013). A latent class approach to
examining forms of peer victimization. Journal of Educational Psychology, 105(3), 839.
*Buchanan, C. M. (2012). Predicting and understanding sexual and nonsexual adolescent peer
victimization in schools: A mixed methods approach. (Order No. NR92242, The University
of Saskatchewan (Canada)). ProQuest Dissertations and Theses, , 281. Retrieved from
http://0-
20
search.proquest.com.prospero.murdoch.edu.au/docview/1315009786?accountid=12629.
(1315009786).
*Burton, K. A., Florell, D., & Gore, J. S. (2013). Differences in Proactive and Reactive
Aggression in Traditional Bullies and Cyberbullies. Journal of Aggression, Maltreatment
& Trauma, 22(3), 316-328.
*Campfield, D. C. (2008). Cyber bullying and victimization: Psychosocial characteristics of
bullies, victims, and bully/victims. (Order No. 3324499, University of Montana). ProQuest
Dissertations and Theses, 171. Retrieved from http://0-
search.proquest.com.prospero.murdoch.edu.au/docview/304530120?accountid=12629.
(304530120).
*Cappadocia, M. C., Craig, W. M., & Pepler, D. (2013). Cyberbullying prevalence, stability, and
risk factors during adolescence. Canadian Journal of School Psychology, 28(2), 171-192.
Card, N. A. (2013). Psychometric considerations for cyberbullying research. In S. Bauman, D.
Cross, & J. Walker (Eds.), Principles of cyberbullying research: Definitions, measures and
methodology: 188-201, New York, NY: Routledge.
*Casas, J. A., Del Rey, R., & Ortega-Ruiz, R. (2013). Bullying and cyberbullying: Convergent
and divergent predictor variables. Computers in Human Behavior, 29(3), 580-587.
*Chang F-C, Lee C-M, Chiu C-H, Hsi W-Y, Huang T-F, Pan Y-C. (2013) Relationships
among cyberbullying, school bullying, and mental health in Taiwanese adolescents.
Journal of School Health. 83(6), 454-62. doi: 10.1111/josh.12050.
Cook, C.R., Williams, K.R., Guerra, N., & Kim, T. (2009). Variability in the prevalence of
bullying and victimization; A cross-national methodological analysis. In S.R. Jimerson,
21
S.M. Swearer, & D.L. Espelage (Eds.) The Handbook of bullying in schools: An
international perspective. London: Routledge.
Cook, C. R., Williams, K. R., Guerra, N. G., Kim, T. E., & Sadek, S. (2010). Predictors of
bullying and victimization in childhood and adolescence: A meta-analytic investigation.
School Psychology Quarterly, 25(2), 65.
Copeland, W. E., Wolke, D., Lereya, S. T., Shanahan, L., Worthman, C., & Costello, E. J.
(2014). Childhood bullying involvement predicts low-grade systemic inflammation into
adulthood. Proceedings of the National Academy of Sciences, 201323641.
David-Ferdon, C. & Hertz, M.F. (2007). Electronic media, violence, and adolescents: An
emerging public health problem. Journal of Adolescent Health, 41, S1-S5. doi:
10.1016/j.jadohealth.2007.08.020
Dempsey, A. G., Sulkowski, M. L., Nichols, R., & Storch, E. A. (2009). Differences between
peer victimization in cyber and physical settings and associated psychosocial adjustment in
early adolescence. Psychology in the Schools, 46(10), 962-972.
*Dempsey, A. G., Sulkowski, M. L., Dempsey, J., & Storch, E. A. (2011). Has cyber technology
produced a new group of peer aggressors? Cyberpsychology, Behavior, and Social
Networking, 14(5), 297-302. doi: 10.1089/cyber.2010.0108
Erdur-Baker, Ö. (2010). Cyberbullying and its correlation to traditional bullying, gender and
frequent and risky usage of internet-mediated communication tools. New Media & Society,
12(1), 109-125.
Espelage, D. L., & Swearer, S. M. (2003). Research on school bullying and victimization: What
have we learned and where do we go from here?. School Psychology Review, 32(3).
22
*Espinoza, G. (2013). A daily diary approach to understanding cyberbullying experiences among
latino adolescents: Links with emotional, physical and school adjustment. (Order No.
3563457, University of California, Los Angeles). ProQuest Dissertations and Theses, , 103.
Retrieved from http://0-
search.proquest.com.prospero.murdoch.edu.au/docview/1399591593?accountid=12629.
(1399591593).
Finkelhor, D., Turner, H. A., & Hamby, S. (2012). Let's prevent peer victimization, not just
bullying. Child Abuse & Neglect, 36(4), 271-274.
*Fredstrom, B. K., Adams, R. E., & Gilman, R. (2011). Electronic and school-based
victimization: Unique contexts for adjustment difficulties during adolescence. Journal of
Youth and Adolescence, 40(4), 405-415.
*Genz, H. (2009). Education, prevention, and intervention of traditional and electronic bullying
in middle school. (Order No. 3379812, Walden University). ProQuest Dissertations and
Theses, , 198. Retrieved from http://0-
search.proquest.com.prospero.murdoch.edu.au/docview/305079704?accountid=12629.
(305079704).
Gilpin, A. R. (1993). Table for conversion of Kendall's Tau to Spearman's Rho within the context
of measures of magnitude of effect for meta-analysis. Educational and Psychological
Measurement, 53(1), 87-92. doi: 10.1177/0013164493053001007
*Gofin, R., & Avitzour, M. (2012). Traditional versus internet bullying in junior high school
students. Maternal and Child Health Journal, 16(8), 1625-1635.
23
*Goldweber, A., Waasdorp, T. E., & Bradshaw, C. P. (2013). Examining the link between forms
of bullying behaviors and perceptions of safety and belonging among secondary school
students. Journal of School Psychology, 51(4), 469-485.
*Görzig, A., & Ólafsson, K. (2013). What makes a bully a cyberbully? Unravelling the
characteristics of cyberbullies across twenty-five European countries. Journal of Children
and Media, 7(1), 9-27.
*Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Traditional bullying and cyber bullying.
Identification of risk groups for adjustment problems. Journal of Psychology, 217(4), 205-
213. doi: 10.1027/0044-3409.217.4.205
*Gradinger, P., Strohmeier, D., & Spiel, C. (2009). Motives for bullying others in cyberspace: A
study of victims and bully-victims in Austria. In Q. Li, D. Cross, & P.K. Smith (Eds.)
Cyberbullying in the Global Playground: Research from International Perspectives (pp.
263-284) West Sussex, UK: Wiley-Blackwell..
*Guomundsson, S.O. (2013). Cyber-bullying amongst elementary school students and how they
cope. Reykjavik University. Retrieved from
http://skemman.is/stream/get/1946/16647/37765/1/E-604-BSC2_-
_Stefán_Örn_Guðmundsson_-_BSc_Thesis_$00282013$0029.pdf
*Hay, C., & Meldrum, R. (2010). Bullying victimization and adolescent self-harm: Testing
hypotheses from general strain theory. Journal of Youth and Adolescence, 39(5), 446-459.
*Hemphill, S. A., Kotevski, A., Tollit, M., Smith, R., Herrenkohl, T. I., Toumbourou, J. W., &
Catalano, R. F. (2012). Longitudinal predictors of cyber and traditional bullying
perpetration in Australian secondary school students. Journal of Adolescent Health, 51(1),
59-65. doi: 10.1016/j.jadohealth.2011.11.019
24
*Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide
Research, 14(3), 206-221. doi: 10.1080/13811118.2010.494133
*Holt, T. J., Chee, G., Ng, E. A. H., & Bossler, A. M. (2013). Exploring the consequences of
bullying victimization in a aample of Singapore youth. International Criminal Justice
Review, 23(1), 25-40.
*Iossi Silva, M.A., Pereira, B., Mendonça, D., Nunes, B., Oliveira, W.A. (2013). The
involvement of girls and boys with bullying: An analysis of gender differences.
International Journal of Environmental Research and Public Health.; 10(12):6820-6831.
*Jose, P. E., Kljakovic, M., Scheib, E., & Notter, O. (2012). The joint development of traditional
bullying and victimization with cyber bullying and victimization in adolescence. Journal of
Research on Adolescence, 22(2), 301-309.
*Juvonen, J., & Gross, E. F. (2008). Extending the school grounds?—Bullying experiences in
cyberspace. Journal of School Health, 78(9), 496-505.
*Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students.
Journal of Adolescent Health, 41(6), S22-S30.
*Kowalski, R. M., & Limber, S. P. (2013). Psychological, physical, and academic correlates of
cyberbullying and traditional bullying. Journal of Adolescent Health, 53(1), S13-S20.
*Kozlosky, R. (2009). Electronic bullying among adolescents (Unpublished doctoral
dissertation). Marywood University.
*Låftman, S. B., Modin, B., & Östberg, V. (2013). Cyberbullying and subjective health: A large-
scale study of students in Stockholm, Sweden. Children and Youth Services Review, 35(1),
112-119.
25
*Landoll, R. R., La Greca, A. M., & Lai, B. S. (2013). Aversive Peer Experiences on Social
Networking Sites: Development of the Social Networking‐Peer Experiences Questionnaire
(SN‐PEQ). Journal of Research on Adolescence, 23(4), 695-705.
Law, D. M., Shapka, J. D., Hymel, S., Olson, B. F., & Waterhouse, T. (2012). The changing face
of bullying: An empirical comparison between traditional and Internet bullying and
victimization. Computers in Human Behavior, 28, 226-232. doi: 10.1016/j.chb.2011.09.004
*Li, Q. (2006). Cyberbullying in schools. A research of gender differences. School Psychology
International, 27(2), 157-170. doi: 10.1177/0143034306064547
*Li, Q. (2007). New bottle but old wine: A research of cyberbullying in schools. Computers in
Human Behavior, 23, 1777-1791. doi: 10.1016/j.chb.2005.10.005
Li, Q., Smith, P. K., & Cross, D. (2012). Research into cyberbullying: Contexy. In Q. Li, D.
Cross, & P.K. Smith (Eds.) Cyberbullying in the Global Playground: Research from
International Perspectives (pp. 3-12). West Sussex, UK: Wiley-Blackwell.
Lipsey, M. W., & Wilson, D., B. (2001). Practical Meta-Analysis. Thousand Oaks, CA: Sage
Publications.
*Lovegrove, P. J., & Cornell, D. G. (2013). Patterns of bullying and victimization associated
with other problem behaviors among high school students: a conditional latent class
approach. Journal of Crime and Justice, (ahead-of-print), 1-18.
*Marsh, L., McGee, R., Nada-Raja, S., & Williams, S. (2010). Brief report: Text bullying and
traditional bullying among New Zealand secondary school students. Journal of
Adolescence, 33, 237-240. doi: 10.1016/j.adolescence.2009.06.001
26
Modecki, K. L., Barber, B. L., & Vernon, L. (2013). Mapping developmental precursors of
cyber-aggression: Trajectories of risk predict perpetration and victimization. Journal of
Youth and Adolescence, 42(5), 651-661.
*Murphy, A. N. (2009). Electronic bullying and aggression in adolescents the demographic,
behavioral, and cognitive predictors of electronic bullying, electronic victimization, and
harm perception of electronic aggression. (Unpublished master’s thesis). Queen’s
University, Ontario, Canada.
*Olenik-Shemesh, D., Heiman, T., & Eden, S. (2012). Cyberbullying victimisation in
adolescence: Relationships with loneliness and depressive mood. Emotional and
Behavioural Difficulties, 17(3-4), 361-374.
*Olweus, D. (2012). Cyberbullying: An overrated phenomenon?. European Journal of
Developmental Psychology, 9(5), 520-538.
Olweus, D. (2013). School bullying: development and some important challenges. Annual
Review of Clinical Psychology, 9, 751-780.
Olweus, D., & Alsaker, F. D. (1991). Assessing change in a cohort-longitudinal study with
hierarchical data. In D. Magnusson, L.R. Bergman, & G. Rudinger (Eds.)
Problems and methods in longitudinal research: Stability and change, (pp. 107-132).
Cambridge, UK: Cambridge University Press.
Olweus, D., & Limber, S. P. (2010). Bullying in school: Evaluation and dissemination of the
Olweus Bullying Prevention Program. American Journal of Orthopsychiatry, 80(1), 124-
134.
27
*Ortega, R., Elipe, P., Mora‐Merchán, J. A., Genta, M. L., Brighi, A., Guarini, A., Smith, P.K.,
Thompson, F., & Tippett, N. (2012). The emotional impact of bullying and cyberbullying
on victims: a European cross‐national study. Aggressive Behavior, 38(5), 342-356.
*Patchin, J. W., & Hinduja, S. (2011). Traditional and nontraditional bullying among youth: A
test of general strain theory. Youth Society, 43, 727-751. doi: 0.1177/0044118X10366951
*Peleg-Oren, N., Cardenas, G. A., Comerford, M., & Galea, S. (2012). An association between
bullying behaviors and alcohol use among middle school students. The Journal of Early
Adolescence, 32(6), 761-775.
*Pergolizzi, F., Pergolizzi, J., Gan, Z., Macario, S., Pergolizzi, J. V., Ewin, T. J., & Gan, T. J.
(2011). Bullying in middle school: Results from a 2008 survey. International Journal of
Adolescent Medicine and Health, 23(1).
*Perren, S., Dooley, J., Shaw, T., & Cross, D. (2010). Bullying in school and cyberspace:
Associations with depressive symptoms in Swiss and Australian adolescents. Child and
Adolescent Psychiatry and Mental Health, 4(28), 1-10. doi: 10.1186/1753-2000-4-28
*Perren, S., & Gutzwiller-Helfenfinger, E. (2012). Cyberbullying and traditional bullying in
adolescence: Differential roles of moral disengagement, moral emotions, and moral values.
(2), 195-209.
Peterson, R. A., & Brown, S. P. (2005). On the use of beta coefficients in meta-analysis. The
Journal of applied psychology, 90(1), 175. doi: 10.1037/0021-9010.90.1.175
*Pornari, C. D., & Wood, J. (2010). Peer and cyber aggression in secondary school students: The
role of moral disengagement, hostile attribution bias, and outcome expectancies.
Aggressive Behavior, 36, 81-94. doi: 10.1002/ab.20336
28
*Price, M., Chin, M. A., Higa-McMillan, C., Kim, S., & Frueh, B. C. (2013). Prevalence and
internalizing problems of ethnoracially diverse victims of traditional and cyber bullying.
School Mental Health, 5(4), 183-191.
*Raskauskas, J., & Stoltz, A. D. (2007). Involvement in traditional and electronic bullying
among adolescents. Developmental Psychology, 43(3), 564-575. doi: 0.1037/0012-
1649.43.3.564
*Raskauskas, J. (2010). Text-bullying: Associations with traditional bullying and depression
among New Zealand adolescents. Journal of School Violence, 9(1), 74-97. doi:
10.1080/15388220903185605
Rivers, I., & Noret, N. (2010). ‘I h8 u’: findings from a five‐year study of text and email
bullying. British Educational Research Journal, 36(4), 643-671.
*Robson, C., & Witenberg, R. T. (2013). The influence of moral disengagement, morally based
self-esteem, age, and gender on traditional bullying and cyberbullying. Journal of School
Violence, 12(2), 211-231.
Runions, K., Shapka, J.D., Dooley, J. & Modecki, K. (2013). Cyber-aggression and victimization
and social information processing: Integrating the medium and the message. Psychology of
Violence, 3(1), 9-26. doi: 10.1037/a0030511
Sabella, R. A., Patchin, J. W., & Hinduja, S. (2013). Cyberbullying myths and realities.
Computers in Human Behavior, 29(6), 2703-2711.
*Salmivalli, C., Sainio, M., & Hodges, E. V. (2013). Electronic victimization: correlates,
antecedents, and consequences among elementary and middle school students. Journal of
Clinical Child & Adolescent Psychology, 42(4), 442-453.
29
*Schneider, S. K., O'Donnell, L., Stueve, A., & Coulter, R. W. (2012). Cyberbullying, school
bullying, and psychological distress: A regional census of high school students, American
Journal of Public Health, 102(1), 171-7.
*Schultze-Krumbholz, A., Jäkel, A., Schultze, M., & Scheithauer, H. (2012). Emotional and
behavioural problems in the context of cyberbullying: A longitudinal study among German
adolescents. Emotional and behavioural difficulties, 17(3-4), 329-345.
*Schumann, L., Craig, W., & Rosu, A. (2014). Power Differentials in Bullying Individuals in a
Community Context. Journal of Interpersonal Violence, 29(5), 846-865.
*Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian
Journal of Psychology, 49, 147-154. doi: 10.1111/j.1467-9450.2007.00611.x
*Slonje, R., Smith, P. K., & Frisen, A. (2012). Processes of cyberbullying, and feelings of
remorse by bullies: A pilot study. European Journal of Developmental Psychology, 9(2),
244-259.
*Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008).
Cyberbullying: Its nature and impact in secondary school pupils. The Journal of Child
Psychology and Psychiatry, 49(4), 376-385. doi: 10.1111/j.1469-7610.2007.01846.x
*Sontag, L. M., Clemans, K. H. Graber, J. A., & Lyndon, S. T. (2011). Traditional and cyber
aggressors and victims: A comparison of psychosocial characteristics. Journal of Youth
Adolescence, 40, 392-404. doi: 10.1007/s10964-010-9575-9
*Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., ... &
Helenius, H. (2010). Psychosocial risk factors associated with cyberbullying among
adolescents: A population-based study. Archives of General Psychiatry, 67(7), 720-728.
30
*Sticca, F., Ruggieri, S., Alsaker, F., & Perren, S. (2013). Longitudinal risk factors for
cyberbullying in adolescence. Journal of Community & Applied Social Psychology, 23(1),
52-67.
*Tippett, N., & Kwak, K. (2012). Cyberbullying in South Korea. In Q. Li, D. Cross, & P.K.
Smith (Eds.) Cyberbullying in the Global Playground: Research from International
Perspectives (pp. 202-219) West Sussex, UK: Wiley-Blackwell.
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of
research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277-287.
*Tomşa, R., Jenaro, C., Campbell, M., & Neacşu, D. (2013). Student's Experiences with
Traditional Bullying and Cyberbullying: Findings from a Romanian Sample. Procedia-
Social and Behavioral Sciences, 78, 586-590.
Turner, H. A., Finkelhor, D., Hamby, S. L., Shattuck, A., & Ormrod, R. K. (2011). Specifying
type and location of peer victimization in a national sample of children and youth. Journal
of Youth and Adolescence, 40(8), 1052-1067.
*Turner, M. G., Exum, M. L., Brame, R., & Holt, T. J. (2013). Bullying victimization and
adolescent mental health: General and typological effects across sex. Journal of Criminal
Justice, 41(1), 53-59.
Vaillancourt, T., McDougall, P., Hymel, S., Krygsman, A., Miller, J., Stiver, K., & Davis, C.
(2008). Bullying: Are researchers and children/youth talking about the same thing?
International Journal of Behavioral Development, 32(6), 486-495.
*Vaillancourt, T., Trinh, V., McDougall, P., Duku, E., Cunningham, L., Cunningham, C., ... &
Short, K. (2010). Optimizing population screening of bullying in school-aged children.
Journal of School Violence, 9(3), 233-250.
31
van Geel, M., Vedder, P., & Tanilon, J. (2014). Relationship between peer victimization,
cyberbullying, and suicide in children and adolescents: A meta-analysis. JAMA Pediatrics.
doi:10.1001/jamapediatrics.2013.4143
Vandebosch, H. & Van Cleemput, K. (2009). Cyberbullying among youngsters: Profiles of
bullies and victims. New Media & Society, 11(8), 1349-1371. doi:
10.1177/1461444809341263
*Vieno, A., Gini, G., & Santinello, M. (2011). Different forms of bullying and their association
to smoking and drinking behavior in Italian adolescents. Journal of School Health, 81(7),
393-399.
Wang, J., Iannotti, R. J., Luk, J. W., & Nansel, T. R. (2010). Co-occurrence of victimization from
five subtypes of bullying: Physical, verbal, social exclusion, spreading rumors, and
cyber. Journal of Pediatric Psychology, 35(10), 1103-1112.
*Wang, J., Iannotti, R. J., & Nansel, T. R. (2009). School bullying among adolescents in the
United States. Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45,
368-375. doi: 10.1016/j.jadohealth.2009.03.021
*Wang, J., Nansel, T. R., & Iannotti, R. J. (2011). Cyber and traditional bullying: Differential
association with depression. Journal of Adolescent Health, 48, 415-417.
doi:10.1016/j.jadohealth.2010.07.012
*Wensley, K., & Campbell, M. (2012). Heterosexual and nonheterosexual young university
students' involvement in traditional and cyber forms of bullying. Cyberpsychology,
Behavior, and Social Networking, 15(12), 649-654.
32
*Werner, N. E., Bumpus, M. F., & Rock, D. (2010). Involvement in Internet aggression during
early adolescence. Journal of Youth and Adolescence, 39, 607-619. doi 10.1007/s10964-
009-9419-7
*Wigderson, S., & Lynch, M. (2013). Cyber-and traditional peer victimization: Unique
relationships with adolescent well-being. Psychology of Violence, 3(4), 297.
*Williams, K. R., & Guerra, N. G. (2007). Prevalence and predictors of Internet bullying.
Journal of Adolescent Health, 41, S14-S21. doi: 10.1016/j.adohealth.2007.08.018
Williford, A., Elledge, L. C., Boulton, A. J., DePaolis, K. J., Little, T. D., & Salmivalli, C.
(2013). Effects of the KiVa antibullying program on cyberbullying and cybervictimization
frequency among Finnish youth. Journal of Clinical Child & Adolescent Psychology,
42(6), 820-833.
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2007). Does on-line harassment constitute bullying?
An exploration of on-line harassment by known peers and on-line-only contacts. Journal of
Adolescent Health, 41(6), S51-S58.
*Wright, M. F., & Li, Y. (2012). Kicking the digital dog: a longitudinal investigation of young
adults' victimization and cyber-displaced aggression. Cyberpsychology, Behavior, and
Social Networking, 15(9), 448-454.
*Wright, M. F., & Li, Y. (2013). The association between cyber victimization and subsequent
cyber aggression: the moderating effect of peer rejection. Journal of Youth and
Adolescence, 42(5), 662-674.
Ybarra, M. L., Boyd, D., Korchmaros, J. D., & Oppenheim, J. K. (2012). Defining and measuring
cyberbullying within the larger context of bullying victimization. Journal of Adolescent
Health, 41, S42-S50. doi:10.1016/j.jadohealth.2007.09.004
33
*Ybarra, M. L., Diener-West, M, & Leaf, P. J. (2007). Examining the overlap in Internet
harrassment and school bullying: Implications for school intervention. Journal of
Adolescent Health, 41, S42-S50. doi:10.1016/j.jadohealth.2007.09.004
*Ybarra, M. L., & Mitchell, K. J. (2004). On-line aggressor/targets, aggressors, and targets: A
comparison of associated youth characteristics. Journal of Child Psychology and
Psychiatry, 45(7), 1308-1316.
*Zhou, Z., Tang, H., Tian, Y., Wei, H., Zhang, F., & Morrison, C. M. (2013). Cyberbullying and
its risk factors among Chinese high school students. School Psychology International,
34(6), 630-647.
34
Table 1.
Prevalence estimates for cyber and traditional bullying (top) and measurement effects on cyber versus traditional prevalence (bottom).
Perpetration
Victimization
Prevalence
Cyber
Traditional
Cyber
Traditional
Estimate
0.155
0.345
0.152
0.36
low
0.153
0.343
0.151
0.358
high
0.157
0.348
0.154
0.362
n
52
52
72
72
Q(df)
Q(51)=13300.8
Q(51)=19470.5
Q(71)=22312.4
Q(71)=37782.2
Prevalence Predictors
Cyber Est. (SE)
Trad. Est. (SE)
Diff. (Z)
Cyber Est. (SE)
Trad. Est. (SE)
Diff. (Z)
Intercept
-0.78(.04)***
-0.83(.03)***
-0.07(.03)*
-0.65(.02)***
Definition
0.71(.02)***
0.9(.02)***
6.89***
0.42(.01)***
0.85(.01)***
22.85***
Example
-0.26(.03)***
0.52(.03)***
19.21***
-0.81(.02)***
-0.05(.02)*
23.46***
Bully
-1(.03)***
-0.8(.02)***
5.50***
-0.97(.02)***
-0.34(.02)***
23.93***
Fun/Tease
0.1(.03)***
0.39(.02)***
8.48***
0.24(.02)***
1.11(.01)***
40.49***
Random
-0.84(.02)***
-0.38(.01)***
18.45***
-0.9(.01)***
-0.72(.01)***
11.02***
n
48
48
67
67
Q(df)
Q(42)=6050.6
Q(42)=10869.5
Q(61)=14790.4
Q(61)=24069.8
35
Note. Estimates for mean confidence intervals are transformed from logits. All Q statistics significant at p < .001. All variables coded as 0 = no; 1
= yes. Definition = measure includes definition with three key bullying criteria. Example = measure includes example of targeted behaviors. Bully
= measure references bully and/or bullying. Fun/Tease = measure includes making fun or teasing without indicating harm or hurt.
***p < .001; **p <0.01; *p <0.05.
36
Table 2
Degree of association (top) and predictors of degree of association between cyber and traditional
bullying (bottom).
Cyber & Trad. Perpetration
Cyber & Trad. Victimization
Correlation Estimate
0.469
0.402
low
0.465
0.398
high
0.474
0.406
n
36
37
Q(df)
Q(35) = 7821.3
Q(36) = 6290.8
Correlation Predictors
Perpetration Est. (SE)
Victimization Est. (SE)
Intercept
0.48 (.02)***
0.32 (.02)***
Trad Relational
0.36 (.01)***
0.33 (.01)***
School/student trad
-0.07 (.02)***
-0.01 (.02)
School/student cyber
0.00 (.01)
-0.02 (.01)
Random
-0.11 (.01)***
0.01 (.01)
n
34
32
Q(df)
Q(29)=2936.2
Q(27)=796.1
Note: All Q’s significant at p < .001. All variables coded as 0 = no; 1 = yes. Trad relational =
correlation based on relational bullying vs. combined or other bullying types. School/student trad
= traditional bullying measure references students and/or school. School/student cyber = cyber
bullying measure references students and/or school.
***p < .001.
37
Figure 1. Error bar charts with effect sizes and 95% confidence intervals from studies reporting
prevalence rates of cyber and traditional perpetration in adolescents.
Note. Size of point scaled based on sample size.
38
Figure 2. Error bar charts with effect sizes and 95% confidence intervals from studies reporting
prevalence rates of cyber and traditional victimization in adolescents.
Note. Size of point scaled based on sample size.
39
Figure 3. Error bar charts with effect sizes and 95% confidence intervals from studies reporting
overlap in cyber and traditional bullying in adolescents.
Note. Size of point scaled based on sample size.