• Architecture and Design
  • Asian and Pacific Studies
  • Business and Economics
  • Classical and Ancient Near Eastern Studies
  • Computer Sciences
  • Cultural Studies
  • Engineering
  • General Interest
  • Geosciences
  • Industrial Chemistry
  • Islamic and Middle Eastern Studies
  • Jewish Studies
  • Library and Information Science, Book Studies
  • Life Sciences
  • Linguistics and Semiotics
  • Literary Studies
  • Materials Sciences
  • Mathematics
  • Social Sciences
  • Sports and Recreation
  • Theology and Religion
  • Publish your article
  • The role of authors
  • Promoting your article
  • Abstracting & indexing
  • Publishing Ethics
  • Why publish with De Gruyter
  • How to publish with De Gruyter
  • Our book series
  • Our subject areas
  • Your digital product at De Gruyter
  • Contribute to our reference works
  • Product information
  • Tools & resources
  • Product Information
  • Promotional Materials
  • Orders and Inquiries
  • FAQ for Library Suppliers and Book Sellers
  • Repository Policy
  • Free access policy
  • Open Access agreements
  • Database portals
  • For Authors
  • Customer service
  • People + Culture
  • Journal Management
  • How to join us
  • Working at De Gruyter
  • Mission & Vision
  • De Gruyter Foundation
  • De Gruyter Ebound
  • Our Responsibility
  • Partner publishers

write a literature review about cyberbullying brainly

Your purchase has been completed. Your documents are now available to view.

Cyberbullying in adolescents: a literature review

Cyberbullying is a universal public health concern that affects adolescents. The growing usage of electronic gadgets and the Internet has been connected to a rise in cyberbullying. The increasing use of the Internet, along with the negative outcomes of cyberbullying on adolescents, has required the study of cyberbullying. In this paper author reviews existing literature on cyberbullying among adolescents. The concept of cyberbullying is explained, including definitions, types of cyberbullying, characteristics or features of victims and cyberbullies, risk factors or causes underlying cyberbullying, and the harmful consequences of cyberbullying to adolescents. Furthermore, examples of programs or intervention to prevent cyberbullying and recommendations for further studies are presented.

Research funding: None declared.

Author contributions: Author has accepted responsibility for the entire content of this manuscript and approved its submission.

Competing interests: Author states no conflict of interest.

Informed consent: Not applicable.

Ethical approval: Not applicable.

1. Ovigli, D, Colombo, P. Information and communication technologies (ICT) in educational research in science museums in Brazil. IJEDICT 2020;16:272–86. Search in Google Scholar

2. Eleuteri, S, Saladino, V, Verrastro, V. Identity, relationships, sexuality, and risky behaviors of adolescents in the context of social media. Sex Relatsh Ther 2017;32:354–65. https://doi.org/10.1080/14681994.2017.1397953 . Search in Google Scholar

3. Saladino, V, Eleuteri, S, Verrastro, V, Petruccelli, F. Perception of cyberbullying in adolescence: a brief evaluation among Italian students. Front Psychol 2020;11:1–7. https://doi.org/10.3389/fpsyg.2020.607225 . Search in Google Scholar PubMed PubMed Central

4. Beale, AV, Hall, KR. Cyberbullying: what school administrators (and parents) can do. Clearing House 2007;81:8–12. https://doi.org/10.3200/tchs.81.1.8-12 . Search in Google Scholar

5. Brody, N, Vangelisti, AL. Bystander intervention in cyberbullying. Commun Monogr 2016;83:94–119. https://doi.org/10.1080/03637751.2015.1044256 . Search in Google Scholar

6. Athanasiou, K, Melegkovits, E, Andrie, EK, Magoulas, C, Tzavara, CK, Richardson, C. Cross-national aspects of cyberbullying victimization among 14–17-year-old adolescents across seven European countries. BMC Publ Health 2018;18:800. https://doi.org/10.1186/s12889-018-5682-4 . Search in Google Scholar PubMed PubMed Central

7. González-Cabrera, J, Tourón, J, Machimbarrena, JM, Gutiérrez-Ortega, M, Álvarez-Bardón, A, Garaigordobil, M. Cyberbullying in gifted students: prevalence and psychological well-being in a Spanish sample. Int J Environ Res Public Health 2019;16:2173. 10.3390/ijerph16122173 Search in Google Scholar PubMed PubMed Central

8. Lee, C, Shin, N. Prevalence of cyberbullying and predictors of cyberbullying perpetration among Korean adolescents. Comput Hum Behav 2017;68:352–8. https://doi.org/10.1016/j.chb.2016.11.047 . Search in Google Scholar

9. Safaria, T. Prevalence and impact of cyberbullying in a sample of Indonesian junior high school students. The Turk Online J Educ Technol 2016;15:82–91. Search in Google Scholar

10. Lee, M-S, Wu, W, Svanström, L, Dalal, K. Cyber bullying prevention: intervention in Taiwan. PLoS One 2013;8:e64031. https://doi.org/10.1371/journal.pone.0064031 . Search in Google Scholar PubMed PubMed Central

11. Whittaker, E, Kowalski, RM. Cyberbullying via social media. J Sch Violence 2015;14:11–29. https://doi.org/10.1080/15388220.2014.949377 . Search in Google Scholar

12. Vaillancourt, T, Faris, R, Mishna, F. Cyberbullying in children and youth: implications for health and clinical practice. Can J Psychiatry 2016;62:368–73. https://doi.org/10.1177/0706743716684791 . Search in Google Scholar PubMed PubMed Central

13. Nixon, C. Current perspectives: the impact of cyberbullying on adolescent health. Adolesc Health Med Ther 2014;5:143–58. https://doi.org/10.2147/ahmt.s36456 . Search in Google Scholar PubMed PubMed Central

14. Heiman, T, Shemesh, D. Cyberbullying experience and gender differences among adolescents in different educational settings. J Learn Disabil 2013;48:146–55. https://doi.org/10.1177/0022219413492855 . Search in Google Scholar PubMed

15. Paris, S, Robert, D. Cyberbullying by adolescents: a preliminary assessment. Educ Forum 2006;70:21–36. 10.1080/00131720508984869 Search in Google Scholar

16. Patchin, JW, Hinduja, S. Bullies move beyond the schoolyard A preliminary look at cyberbullying. Youth Violence Juv Justice 2006;4:148–69. https://doi.org/10.1177/1541204006286288 . Search in Google Scholar

17. Kowalski, RM, Limber, SP. Electronic bullying among middle school students. J Adolesc Health 2007;41(6 Suppl 1):S22–30. https://doi.org/10.1016/j.jadohealth.2007.08.017 . Search in Google Scholar PubMed

18. Raskauskas, J, Stoltz, AD. Involvement in traditional and electronic bullying among adolescents. Dev Psychol 2007;43:564–75. https://doi.org/10.1037/0012-1649.43.3.564 . Search in Google Scholar PubMed

19. Menesini, E, Nocentini, A, Palladino, BE, Frisén, A, Berne, S, Rosario, R. Cyberbullying definition among adolescents: a comparison across six European countries. Cyberpsychol Behav Soc Netw 2012;15:455–63. https://doi.org/10.1089/cyber.2012.0040 . Search in Google Scholar PubMed PubMed Central

20. Dooley, JJ, Pyżalski, J, Cross, D. Cyberbullying versus face-to-face bullying: a theoretical and conceptual review. Z Psychol 2009;217:182–8. https://doi.org/10.1027/0044-3409.217.4.182 . Search in Google Scholar

21. Nocentini, A, Calmaestra, J, Anja, A, Scheithauer, H, Ortega, R, Menesini, E. Cyberbullying: labels, behaviours and definition in three European countries. Aust J Guid Counsell 2010;20:129–42. https://doi.org/10.1375/ajgc.20.2.129 . Search in Google Scholar

22. Aboujaoude, E, Savage, MW, Starcevic, V, Salame, WO. Cyberbullying: review of an old problem gone viral. J Adolesc Health 2015;57:10–8. https://doi.org/10.1016/j.jadohealth.2015.04.011 . Search in Google Scholar PubMed

23. Ferrara, P, Ianniello, F, Villani, A, Corsello, G. Cyberbullying a modern form of bullying: let’s talk about this health and social problem. Ital J Pediatr 2018;44:14. https://doi.org/10.1186/s13052-018-0446-4 . Search in Google Scholar PubMed PubMed Central

24. Smith, PK, Mahdavi, J, Carvalho, M, Fisher, S, Russell, S, Tippett, N. Cyberbullying: its nature and impact in secondary school pupils. JCPP (J Child Psychol Psychiatry) 2008;49:376–85. https://doi.org/10.1111/j.1469-7610.2007.01846.x . Search in Google Scholar PubMed

25. Garett, R, Lord, LR, Young, SD. Associations between social media and cyberbullying: a review of the literature. mHealth 2016;2:46. https://doi.org/10.21037/mhealth.2016.12.01 . Search in Google Scholar PubMed PubMed Central

26. Li, Q. Bullying in the new playground: research into cyberbullying and cyber victimisation. Australas J Educ Technol 2007;23:435–54. 10.14742/ajet.1245 Search in Google Scholar

27. Zeljka, D, Vesna, C, Rajkovača, I, Včev, A, Miskic, D, Miskic, B. Cyberbullying in early adolescence: is there a difference between urban and rural environment? Am J Biomed Sci Res 2019;1:191–6. 10.34297/AJBSR.2019.01.000542 Search in Google Scholar

28. Ybarra, ML, Mitchell, KJ, Wolak, J, Finkelhor, D. Examining characteristics and associated distress related to internet harassment: findings from the second youth internet safety survey. Pediatrics 2006;118:e1169–77. https://doi.org/10.1542/peds.2006-0815 . Search in Google Scholar PubMed

29. Li, Q. Cyberbullying in schools: a research of gender differences. Sch Psychol Int 2006;27:157–70. 10.1177/0143034306064547 Search in Google Scholar

30. Ybarra, ML, Mitchell, KJ. Youth engaging in online harassment: associations with caregiver–child relationships, Internet use, and personal characteristics. J Adolesc 2004;27:319–36. https://doi.org/10.1016/s0140-1971(04)00039-9 . Search in Google Scholar

31. Dhond, V, Richter, S, McKenna, B, editors. Exploratory research to identify the characteristics of cyber victims on social media in New Zealand . Cham: Springer International Publishing; 2019. 10.1007/978-3-030-11395-7_18 Search in Google Scholar

32. Ybarra, ML, Mitchell, KJ. Prevalence and frequency of Internet harassment instigation: implications for adolescent health. J Adolesc Health 2007;41:189–95. https://doi.org/10.1016/j.jadohealth.2007.03.005 . Search in Google Scholar PubMed

33. Zhong, J, Zheng, Y, Huang, X, Mo, D, Gong, J, Li, M. Study of the influencing factors of cyberbullying among Chinese college students incorporated with digital citizenship: from the perspective of individual students. Front Psychol 2021;12:621418. https://doi.org/10.3389/fpsyg.2021.621418 . Search in Google Scholar PubMed PubMed Central

34. Wong-Lo, M, Bullock, LM, Gable, RA. Cyber bullying: practices to face digital aggression. Emot Behav Difficulties 2011;16:317–25. https://doi.org/10.1080/13632752.2011.595098 . Search in Google Scholar

35. Barlett, C, Gentile, D. Attacking others online: the formation of cyberbullying in late adolescence. Psychol Popular Media Culture 2012;1:123–35. https://doi.org/10.1037/a0028113 . Search in Google Scholar

36. Mason. Cyberbullying: a preliminary assessment for school personnel. Psychol Sch 2008;45:323–48. 10.1002/pits.20301 Search in Google Scholar

37. Pratto, F, Stewart, AL, Zeineddine, F. When inequality fails: power, group dominance, and societal change. J Soc Polit Psychol 2013;1:132–60. https://doi.org/10.5964/jspp.v1i1.97 . Search in Google Scholar

38. Koski, JE, Xie, H, Olson, IR. Understanding social hierarchies: the neural and psychological foundations of status perception. Soc Neurosci 2015;10:527–50. https://doi.org/10.1080/17470919.2015.1013223 . Search in Google Scholar PubMed PubMed Central

39. Walker, C, Sockman, B, Koehn, S. An exploratory study of cyberbullying with undergraduate university students. TechTrends 2011;55:31–8. 10.1007/s11528-011-0481-0 Search in Google Scholar

40. Pratto, F, Sidanius, J, Levin, S. Social dominance theory and the dynamics of intergroup relations: Taking stock and looking forward. Eur Rev Soc Psychol 2006;17:271–320. https://doi.org/10.1080/10463280601055772 . Search in Google Scholar

41. Sidanius, J, Pratto, F, Van Laar, C, Levin, S. Social dominance theory: its agenda and method. Polit Psychol 2004;25:845–80. https://doi.org/10.1111/j.1467-9221.2004.00401.x . Search in Google Scholar

42. Closson, LM. Aggressive and prosocial behaviors within early adolescent friendship cliques: what’s status got to do with it? Merrill-Palmer Q 2009;55:406–35. https://doi.org/10.1353/mpq.0.0035 . Search in Google Scholar

43. Salmivalli, C, Kärnä, A, Poskiparta, E. Counteracting bullying in Finland: the KiVa program and its effect on different forms of being bullied. IJBD (Int J Behav Dev) 2011;35:405–11. https://doi.org/10.1177/0165025411407457 . Search in Google Scholar

44. Chisholm, JF. Review of the status of cyberbullying and cyberbullying prevention. J Inf Syst Educ 2014;25:77–87. Search in Google Scholar

45. Bonanno, RA, Hymel, S. Cyber bullying and internalizing difficulties: above and beyond the impact of traditional forms of bullying. J Youth Adolesc 2013;42:685–97. https://doi.org/10.1007/s10964-013-9937-1 . Search in Google Scholar PubMed

46. Wolke, D, Copeland, WE, Angold, A, Costello, EJ. Impact of bullying in childhood on adult health, wealth, crime, and social outcomes. Psychol Sci 2013;24:1958–70. https://doi.org/10.1177/0956797613481608 . Search in Google Scholar PubMed PubMed Central

47. Foody, M, Samara, M, Carlbring, P. A review of cyberbullying and suggestions for online psychological therapy. Internet Interv 2015;2:235–42. https://doi.org/10.1016/j.invent.2015.05.002 . Search in Google Scholar

48. Dredge, R, Gleeson, J, Garcia, X. Cyberbullying in social networking sites: an adolescent victim’s perspective. Comput Hum Behav 2014;36:13–20. https://doi.org/10.1016/j.chb.2014.03.026 . Search in Google Scholar

49. Schenk, AM, Fremouw, WJ. Prevalence, psychological impact, and coping of cyberbully victims among college students. J Sch Violence 2012;11:21–37. https://doi.org/10.1080/15388220.2011.630310 . Search in Google Scholar

50. Burger, C, Bachmann, L. Perpetration and victimization in offline and cyber contexts: a variable- and person-oriented examination of associations and differences regarding domain-specific self-esteem and school adjustment. Int J Environ Res Publ Health 2021;18:10429. https://doi.org/10.3390/ijerph181910429 . Search in Google Scholar PubMed PubMed Central

51. Price, M, Dalgleish, J. Cyberbullying: experiences, impacts and coping strategies as described by Australian young people. Youth Stud Aust 2010;29:51–9. Search in Google Scholar

52. Jang, H, Song, J, Kim, R. Does the offline bully-victimization influence cyberbullying behavior among youths? Application of General Strain Theory. Comput Hum Behav 2014;31:85–93. https://doi.org/10.1016/j.chb.2013.10.007 . Search in Google Scholar

53. Ybarra, ML, West, M, Leaf, PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolesc Health 2007;41(6 Suppl 1):S42–50. https://doi.org/10.1016/j.jadohealth.2007.09.004 . Search in Google Scholar PubMed

54. Mishna, F, Kassabri, M, Gadalla, T, Daciuk, J. Risk factors or involvement in cyber bullying: victims, bullies and bully–victims. Child Youth Serv Rev 2012;34:63–70. https://doi.org/10.1016/j.childyouth.2011.08.032 . Search in Google Scholar

55. Wong, DSW, Chan, HC, Cheng, CHK. Cheng. Cyberbullying perpetration and victimization among adolescents in Hong Kong. Child Youth Serv Rev 2014;36:133–40. https://doi.org/10.1016/j.childyouth.2013.11.006 . Search in Google Scholar

56. Bauman, S, Toomey, RB, Walker, JL. Associations among bullying, cyberbullying, and suicide in high school students. J Adolesc 2013;36:341–50. https://doi.org/10.1016/j.adolescence.2012.12.001 . Search in Google Scholar PubMed

57. Fletcher, A, Yau, N, Jones, R, Allen, E, Viner, RM, Bonell, C. Brief report: cyberbullying perpetration and its associations with socio-demographics, aggressive behaviour at school, and mental health outcomes. J Adolesc 2014;37:1393–8. https://doi.org/10.1016/j.adolescence.2014.10.005 . Search in Google Scholar PubMed

58. Kraft, EM, Wang, J. Effectiveness of cyber bullying prevention strategies: a study on students’ perspectives. Int J Cyber Criminol 2009;3:513. Search in Google Scholar

59. Williford, A, Elledge, LC, Boulton, AJ, DePaolis, KJ, Little, TD, Salmivalli, C. Effects of the KiVa antibullying program on cyberbullying and cybervictimization frequency among Finnish youth. J Clin Child Adolesc Psychol 2013;42:820–33. https://doi.org/10.1080/15374416.2013.787623 . Search in Google Scholar PubMed

60. Menesini, E, Zambuto, V, Palladino, BE. 10 - online and school-based programs to prevent cyberbullying among Italian adolescents: what works, why, and under which circumstances. In: Campbell, M, Bauman, S, editors. Reducing cyberbullying in schools . Cambridge: Academic Press; 2018:35–43 pp. 10.1016/B978-0-12-811423-0.00010-9 Search in Google Scholar

61. David, A, Rio, J, Pueyo, A, Calvo, G. Effects of a cooperative learning intervention program on cyberbullying in secondary education: a case study. Qual Rep 2019;24:2426–40. Search in Google Scholar

62. Leung, ANM, Wong, N, Farver, JM. Farver. Testing the effectiveness of an E-course to combat cyberbullying. Cyberpsychol Behav Soc Netw 2019;22:569–77. https://doi.org/10.1089/cyber.2018.0609 . Search in Google Scholar PubMed

63. Barón, J, Buelga, S, Ayllón, E, Ferrer, B, Cava, M. Effects of intervention program Prev@cib on traditional bullying and cyberbullying. Int J Environ Res Publ Health 2019;16:527. 10.3390/ijerph16040527 Search in Google Scholar PubMed PubMed Central

64. Doane, A, Ehlke, S, Kelley, M. Bystanders against cyberbullying: a video program for college students. Int J Bull Prev 2020;2:41–52. https://doi.org/10.1007/s42380-019-00051-5 . Search in Google Scholar

© 2022 Walter de Gruyter GmbH, Berlin/Boston

  • X / Twitter

Supplementary Materials

Please login or register with De Gruyter to order this product.

International Journal of Adolescent Medicine and Health

Journal and Issue

Articles in the same issue.

Cyberbullying: A Systematic Literature Review to Identify the Factors Impelling University Students Towards Cyberbullying

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Cyberbullying in adolescents: a literature review

Affiliation.

  • 1 Department of Health Education and Behavioral Sciences, Faculty of Public Health, Mahidol University, Bangkok 10400, Thailand.
  • PMID: 35245420
  • DOI: 10.1515/ijamh-2021-0133

Cyberbullying is a universal public health concern that affects adolescents. The growing usage of electronic gadgets and the Internet has been connected to a rise in cyberbullying. The increasing use of the Internet, along with the negative outcomes of cyberbullying on adolescents, has required the study of cyberbullying. In this paper author reviews existing literature on cyberbullying among adolescents. The concept of cyberbullying is explained, including definitions, types of cyberbullying, characteristics or features of victims and cyberbullies, risk factors or causes underlying cyberbullying, and the harmful consequences of cyberbullying to adolescents. Furthermore, examples of programs or intervention to prevent cyberbullying and recommendations for further studies are presented.

Keywords: adolescents; cyberbullying; literature review.

© 2022 Walter de Gruyter GmbH, Berlin/Boston.

Publication types

  • Adolescent Behavior*
  • Bullying* / prevention & control
  • Crime Victims*
  • Cyberbullying*
  • Risk Factors

Have a language expert improve your writing

Run a free plagiarism check in 10 minutes, generate accurate citations for free.

  • Knowledge Base

Methodology

  • How to Write a Literature Review | Guide, Examples, & Templates

How to Write a Literature Review | Guide, Examples, & Templates

Published on January 2, 2023 by Shona McCombes . Revised on September 11, 2023.

What is a literature review? A literature review is a survey of scholarly sources on a specific topic. It provides an overview of current knowledge, allowing you to identify relevant theories, methods, and gaps in the existing research that you can later apply to your paper, thesis, or dissertation topic .

There are five key steps to writing a literature review:

  • Search for relevant literature
  • Evaluate sources
  • Identify themes, debates, and gaps
  • Outline the structure
  • Write your literature review

A good literature review doesn’t just summarize sources—it analyzes, synthesizes , and critically evaluates to give a clear picture of the state of knowledge on the subject.

Instantly correct all language mistakes in your text

Upload your document to correct all your mistakes in minutes

upload-your-document-ai-proofreader

Table of contents

What is the purpose of a literature review, examples of literature reviews, step 1 – search for relevant literature, step 2 – evaluate and select sources, step 3 – identify themes, debates, and gaps, step 4 – outline your literature review’s structure, step 5 – write your literature review, free lecture slides, other interesting articles, frequently asked questions, introduction.

  • Quick Run-through
  • Step 1 & 2

When you write a thesis , dissertation , or research paper , you will likely have to conduct a literature review to situate your research within existing knowledge. The literature review gives you a chance to:

  • Demonstrate your familiarity with the topic and its scholarly context
  • Develop a theoretical framework and methodology for your research
  • Position your work in relation to other researchers and theorists
  • Show how your research addresses a gap or contributes to a debate
  • Evaluate the current state of research and demonstrate your knowledge of the scholarly debates around your topic.

Writing literature reviews is a particularly important skill if you want to apply for graduate school or pursue a career in research. We’ve written a step-by-step guide that you can follow below.

Literature review guide

Here's why students love Scribbr's proofreading services

Discover proofreading & editing

Writing literature reviews can be quite challenging! A good starting point could be to look at some examples, depending on what kind of literature review you’d like to write.

  • Example literature review #1: “Why Do People Migrate? A Review of the Theoretical Literature” ( Theoretical literature review about the development of economic migration theory from the 1950s to today.)
  • Example literature review #2: “Literature review as a research methodology: An overview and guidelines” ( Methodological literature review about interdisciplinary knowledge acquisition and production.)
  • Example literature review #3: “The Use of Technology in English Language Learning: A Literature Review” ( Thematic literature review about the effects of technology on language acquisition.)
  • Example literature review #4: “Learners’ Listening Comprehension Difficulties in English Language Learning: A Literature Review” ( Chronological literature review about how the concept of listening skills has changed over time.)

You can also check out our templates with literature review examples and sample outlines at the links below.

Download Word doc Download Google doc

Before you begin searching for literature, you need a clearly defined topic .

If you are writing the literature review section of a dissertation or research paper, you will search for literature related to your research problem and questions .

Make a list of keywords

Start by creating a list of keywords related to your research question. Include each of the key concepts or variables you’re interested in, and list any synonyms and related terms. You can add to this list as you discover new keywords in the process of your literature search.

  • Social media, Facebook, Instagram, Twitter, Snapchat, TikTok
  • Body image, self-perception, self-esteem, mental health
  • Generation Z, teenagers, adolescents, youth

Search for relevant sources

Use your keywords to begin searching for sources. Some useful databases to search for journals and articles include:

  • Your university’s library catalogue
  • Google Scholar
  • Project Muse (humanities and social sciences)
  • Medline (life sciences and biomedicine)
  • EconLit (economics)
  • Inspec (physics, engineering and computer science)

You can also use boolean operators to help narrow down your search.

Make sure to read the abstract to find out whether an article is relevant to your question. When you find a useful book or article, you can check the bibliography to find other relevant sources.

You likely won’t be able to read absolutely everything that has been written on your topic, so it will be necessary to evaluate which sources are most relevant to your research question.

For each publication, ask yourself:

  • What question or problem is the author addressing?
  • What are the key concepts and how are they defined?
  • What are the key theories, models, and methods?
  • Does the research use established frameworks or take an innovative approach?
  • What are the results and conclusions of the study?
  • How does the publication relate to other literature in the field? Does it confirm, add to, or challenge established knowledge?
  • What are the strengths and weaknesses of the research?

Make sure the sources you use are credible , and make sure you read any landmark studies and major theories in your field of research.

You can use our template to summarize and evaluate sources you’re thinking about using. Click on either button below to download.

Take notes and cite your sources

As you read, you should also begin the writing process. Take notes that you can later incorporate into the text of your literature review.

It is important to keep track of your sources with citations to avoid plagiarism . It can be helpful to make an annotated bibliography , where you compile full citation information and write a paragraph of summary and analysis for each source. This helps you remember what you read and saves time later in the process.

The only proofreading tool specialized in correcting academic writing - try for free!

The academic proofreading tool has been trained on 1000s of academic texts and by native English editors. Making it the most accurate and reliable proofreading tool for students.

write a literature review about cyberbullying brainly

Try for free

To begin organizing your literature review’s argument and structure, be sure you understand the connections and relationships between the sources you’ve read. Based on your reading and notes, you can look for:

  • Trends and patterns (in theory, method or results): do certain approaches become more or less popular over time?
  • Themes: what questions or concepts recur across the literature?
  • Debates, conflicts and contradictions: where do sources disagree?
  • Pivotal publications: are there any influential theories or studies that changed the direction of the field?
  • Gaps: what is missing from the literature? Are there weaknesses that need to be addressed?

This step will help you work out the structure of your literature review and (if applicable) show how your own research will contribute to existing knowledge.

  • Most research has focused on young women.
  • There is an increasing interest in the visual aspects of social media.
  • But there is still a lack of robust research on highly visual platforms like Instagram and Snapchat—this is a gap that you could address in your own research.

There are various approaches to organizing the body of a literature review. Depending on the length of your literature review, you can combine several of these strategies (for example, your overall structure might be thematic, but each theme is discussed chronologically).

Chronological

The simplest approach is to trace the development of the topic over time. However, if you choose this strategy, be careful to avoid simply listing and summarizing sources in order.

Try to analyze patterns, turning points and key debates that have shaped the direction of the field. Give your interpretation of how and why certain developments occurred.

If you have found some recurring central themes, you can organize your literature review into subsections that address different aspects of the topic.

For example, if you are reviewing literature about inequalities in migrant health outcomes, key themes might include healthcare policy, language barriers, cultural attitudes, legal status, and economic access.

Methodological

If you draw your sources from different disciplines or fields that use a variety of research methods , you might want to compare the results and conclusions that emerge from different approaches. For example:

  • Look at what results have emerged in qualitative versus quantitative research
  • Discuss how the topic has been approached by empirical versus theoretical scholarship
  • Divide the literature into sociological, historical, and cultural sources

Theoretical

A literature review is often the foundation for a theoretical framework . You can use it to discuss various theories, models, and definitions of key concepts.

You might argue for the relevance of a specific theoretical approach, or combine various theoretical concepts to create a framework for your research.

Like any other academic text , your literature review should have an introduction , a main body, and a conclusion . What you include in each depends on the objective of your literature review.

The introduction should clearly establish the focus and purpose of the literature review.

Depending on the length of your literature review, you might want to divide the body into subsections. You can use a subheading for each theme, time period, or methodological approach.

As you write, you can follow these tips:

  • Summarize and synthesize: give an overview of the main points of each source and combine them into a coherent whole
  • Analyze and interpret: don’t just paraphrase other researchers — add your own interpretations where possible, discussing the significance of findings in relation to the literature as a whole
  • Critically evaluate: mention the strengths and weaknesses of your sources
  • Write in well-structured paragraphs: use transition words and topic sentences to draw connections, comparisons and contrasts

In the conclusion, you should summarize the key findings you have taken from the literature and emphasize their significance.

When you’ve finished writing and revising your literature review, don’t forget to proofread thoroughly before submitting. Not a language expert? Check out Scribbr’s professional proofreading services !

This article has been adapted into lecture slides that you can use to teach your students about writing a literature review.

Scribbr slides are free to use, customize, and distribute for educational purposes.

Open Google Slides Download PowerPoint

If you want to know more about the research process , methodology , research bias , or statistics , make sure to check out some of our other articles with explanations and examples.

  • Sampling methods
  • Simple random sampling
  • Stratified sampling
  • Cluster sampling
  • Likert scales
  • Reproducibility

 Statistics

  • Null hypothesis
  • Statistical power
  • Probability distribution
  • Effect size
  • Poisson distribution

Research bias

  • Optimism bias
  • Cognitive bias
  • Implicit bias
  • Hawthorne effect
  • Anchoring bias
  • Explicit bias

A literature review is a survey of scholarly sources (such as books, journal articles, and theses) related to a specific topic or research question .

It is often written as part of a thesis, dissertation , or research paper , in order to situate your work in relation to existing knowledge.

There are several reasons to conduct a literature review at the beginning of a research project:

  • To familiarize yourself with the current state of knowledge on your topic
  • To ensure that you’re not just repeating what others have already done
  • To identify gaps in knowledge and unresolved problems that your research can address
  • To develop your theoretical framework and methodology
  • To provide an overview of the key findings and debates on the topic

Writing the literature review shows your reader how your work relates to existing research and what new insights it will contribute.

The literature review usually comes near the beginning of your thesis or dissertation . After the introduction , it grounds your research in a scholarly field and leads directly to your theoretical framework or methodology .

A literature review is a survey of credible sources on a topic, often used in dissertations , theses, and research papers . Literature reviews give an overview of knowledge on a subject, helping you identify relevant theories and methods, as well as gaps in existing research. Literature reviews are set up similarly to other  academic texts , with an introduction , a main body, and a conclusion .

An  annotated bibliography is a list of  source references that has a short description (called an annotation ) for each of the sources. It is often assigned as part of the research process for a  paper .  

Cite this Scribbr article

If you want to cite this source, you can copy and paste the citation or click the “Cite this Scribbr article” button to automatically add the citation to our free Citation Generator.

McCombes, S. (2023, September 11). How to Write a Literature Review | Guide, Examples, & Templates. Scribbr. Retrieved March 25, 2024, from https://www.scribbr.com/dissertation/literature-review/

Is this article helpful?

Shona McCombes

Shona McCombes

Other students also liked, what is a theoretical framework | guide to organizing, what is a research methodology | steps & tips, how to write a research proposal | examples & templates, "i thought ai proofreading was useless but..".

I've been using Scribbr for years now and I know it's a service that won't disappoint. It does a good job spotting mistakes”

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Int J Environ Res Public Health

Logo of ijerph

Cyberbullying Characteristics and Prevention—What Can We Learn from Narratives Provided by Adolescents and Their Teachers?

Jacek pyżalski.

1 Faculty of Educational Studies, Adam Mickiewicz University of Poznań, 60-568 Poznań, Poland

Piotr Plichta

2 Institute of Pedagogy, Faculty of Historical and Pedagogical Sciences, University of Wrocław, 50-139 Wrocław, Poland

Anna Szuster

3 Faculty of Psychology, University of Warsaw, 00-183 Warsaw, Poland

Julia Barlińska

Associated data.

Not applicable. The respondents were informed that the raw data will not be published and available.

The purpose of this article is to present the results of the study on the specific aspects of cyberbullying and prevention measures viewed from both the students’ and teachers’ perspectives. Cyberbullying is a severe threat to the individual and social well-being of young people. For this reason, it is important to understand how they perceive the phenomenon of cyberbullying, how they identify its causes, what they think about support, and the preventive measures offered through the lens of their own cyberbullying experiences. The study was conducted in a qualitative research paradigm. Students (N = 55) aged 13–16 from 25 junior high schools located in different regions of (blinded for the review) who had experienced cyberbullying incidents as victims, perpetrators, or bystanders, and their teachers (N = 45) were interviewed. They provided in-depth answers regarding cyberbullying incidents they had experienced and presented their attitudes and interpretations concerning those cases. The raw data were analysed by competent judges who defined a posteriori important categories that were useful for understanding the psychosocial mechanisms of cyberbullying and important dimensions of its prevention. The results proved a clear connection between participation in offline and online peer violence. The analysis of the statements showed that public/private types of cyberbullying involve different psychological and social mechanisms. Our findings confirm the importance of empathy as the buffering factor in cyberbullying perpetration. In addition, the limitations and inadequacy of the support and interventions offered by adults in cyberbullying cases have been emphasised in teens’ testimonies. The results may constitute grounds for formulating recommendations on the prevention of cyberbullying in the school context, taking into account the perspective of all actors involved.

1. Introduction

The aim of the current study is to present how young people and teachers perceive the phenomenon of cyberbullying from the perspective of different actors. We also focus on experienced causes, content and consequences, and perception of prevention and intervention measures utilised in schools.

Cyberbullying is most often defined as “any behaviour performed through electronic or digital media by individuals or groups that repeatedly communicates hostile or aggressive messages intended to inflict harm or discomfort on others” [ 1 ]. This covers a variety of different private and public methods like texts, videos, and theft of online identity that may have a different victimisation potential. Both online and offline bullying (without ICT involvement) has been associated with serious mental health problems in all involved actors—perpetrators, bystanders, but particularly victims who commonly suffer from depressive symptoms, psychosomatic problems, anxiety in the long term, and lower school achievements [ 2 , 3 ]. Bullying can lead to severe symptoms, such as self-harm and suicidality [ 4 ], which may even present in adults who experienced bullying while young [ 2 , 3 ], making cyberbullying a serious threat to both individual and social wellbeing. For this reason, it is important to understand how adolescents perceive the phenomenon of cyberbullying, how they identify its causes, what they think about support, and the preventive measures offered through the lens of their own cyberbullying experiences. The complexity of the phenomenon of peer violence requires the use of diversified research methods, comprising various theoretical perspectives and methodological traditions. Further, the respondent groups should be diversified and include adolescents, parents, teachers, and other school staff. Such an approach is an important standard recognised by the Society of Prevention Research (SPR) [ 5 ]. Particularly teachers form an important group of respondents since their knowledge and decisions influence the practice of prevention and intervention measures [ 6 ]. At the same time their incompetence and mistakes in this area may worsen the consequences of cyberbullying incidents.

Large research demonstrates the link between high-quality teacher–student relationships and numerous beneficial student outcomes such as reduced problem behaviour, increased academic achievement, enhanced school engagement, and improved social standing among peers. Synthesis of the literature on school-based interventions that included an outcome measure of teacher–student relationship quality revealed four approaches targeting teacher–student relationship quality by (a) increasing closeness; (b) decreasing conflict; (c) promoting social-emotional learning; and (d) emphasising relationship-driven classroom management [ 7 ].

Over the past fifteen years, a number of programs have focused on the prevention and education related to various forms of bullying. The crucial issue is whether these preventive measures are appropriate for the phenomenon of cyberbullying and meet the teenagers’ needs [ 8 , 9 ].

1.1. Key Knowledge Gaps in the Research on the Effectiveness of Anti-Cyberbullying Programs Addressed to Adolescents

The effectiveness of anti-cyberbullying programs has not been sufficiently assessed [ 10 , 11 , 12 ], with few studies demonstrating convincingly which methods are effective and for whom specifically. Additionally, little is known about the critical components of such programs that influence their effectiveness. It is also desirable for particular preventive actions to be part of carefully designed programs following the salutogenic model, in which prevention measures and enhancing participants’ empathic responsiveness is prioritised over combatting violence [ 13 , 14 ].

This line of thought is supported mainly by correlational studies that the cognitive and affective components of empathy have been shown to reduce aggressive behaviour [ 15 , 16 , 17 ]. Cyberbullies have also been found to have lower cognitive dispositional empathy towards their potential victims [ 18 ]. Few experimental research confirms the following directional relationship: affective and cognitive empathy activation significantly lowers the number of cyber-violence supporting acts by witnesses [ 14 ].

Some proposed intervention approaches are more general, with no specific provisions for cyberbullying in their prevention efforts. Among the proponents of this holistic approach are Olweus [ 13 ], as well as Espelage and Hong [ 19 ], who emphasise the need to integrate interventions aimed at traditional violence with countermeasures that target cyberbullying. Although school bullying has been explored thoroughly from the mid-1970s until the present, still little consensus regarding the relations between the two concepts has been achieved. Mostly the issues of validity of traditional bullying criteria are discussed by scientists, for example, the issue of repetition as in cyberbullying where the individual act is sometimes very harmful, as well as intentionality as it is easier to harm someone unintentionally online. For some scholars, those reasoning should lead to treating cyberbullying as a completely different phenomenon than bullying [ 1 , 20 , 21 , 22 ]. Some recent reports on programmes’ efficacy have indicated that dealing with only one of these phenomena on its own may paradoxically lead to increased violence [ 23 ]. However, other approaches have emphasised the need to take into account the particular characteristics of the digital media as well as specific cyberbullying mechanisms in the methodology of preventive measures, which should, accordingly, be tailored to the specifics of cyberbullying [ 24 , 25 , 26 ]. Programmes that address this second aspect tend to focus more on highlighting interventions aimed at specific roles in bullying following the triadic approach, such as mobilising bystanders [ 14 , 27 , 28 , 29 ].

Cyberbystanders are understood as students who “[notice] a social situation occurring among a cyberbully and a cybervictim” [ 30 ] (p. 124). It has been proved that cyberbystanders are the most numerous party engaged in cyber-bullying acts (20–55%) [ 30 ], comparing with 20–23% in the case of cyber-preparation and cyber-victimisation [ 31 ]; they are powerful social influence in creating both negative behavioral models—reinforcing the bullying and positive ones with responses such as intervention in cyberbullying cases [ 14 , 32 , 33 , 34 ]. Based on this approach, a successful programme should engage cyberbystanders and mobilise their willingness to provide informal help to their peers [ 14 , 30 , 34 , 35 , 36 ]. Data clearly states that the most effective factor in achieving this goal is the level of empathy in potential helpers [ 14 , 35 , 36 , 37 ]. Peers support along with the exploration of the role of empathy as the activator of cyberbystanders’ prosocial behaviour towards victims [ 14 ] enhance the development of behaviours aimed at coping with this form of violence.

Another under-researched area is the assessment of defensive actions undertaken by adolescents themselves. A couple of directions can be identified: the effectiveness of specific coping strategies for victims of cyberbullying, peer support and its effectiveness in diminishing the negative impact of violence on a victim’s wellbeing, as well as the exploration of the role of empathy as the activator of cyberbystanders’ prosocial behaviour towards victims [ 14 ]. Bystanders’ support for cybervictims has proved to be an important strategy in reducing cyberbullying [ 14 , 32 , 33 , 34 ]. Based on this approach, a successful programme should engage bystanders and mobilise their willingness to provide informal help to their peers [ 14 , 30 , 34 , 35 , 36 ]. Data clearly states that the most effective factor in achieving this goal is the level of empathy in potential helpers [ 14 , 35 , 36 , 37 ]. The possibilities for natural activation of empathy in an online context are particularly limited, due to both cyberspace conditions and the developmental specifics of adolescence.

To sum up, the main issues that are important in creating effective cyberbullying prevention projects are the cyberbullying criteria (especially intentionality, since numerous hostile acts online are conducted without an intention to harm), and the need for a more in-depth exploration of the key factors that moderate cyberbullying via addressing wider groups of participants and using a wider portfolio of research methods. The most important challenge is the need for controlling the impact of specifics of adolescent behaviour and its online manifestation in cyberbullying.

1.2. Psychological Aspects of Cyberbullying: The Impact of the Specifics of Adolescence, Online Communication, Empathy and Appearance Online

The period of adolescence is characterised by powerful egocentrism with its accompanying sensitivity about oneself, as well as conformism towards the peer group. These qualities make adolescents particularly amenable to social influence [ 38 ]. The peer group is the point of reference for creating one’s self-image, as well as satisfying basic social needs of belonging and affiliation [ 38 ]. The developmental specifics of adolescence are also characterised by an imbalance between cognitive abilities and motivation to control and anticipate one’s behaviour, which takes into account social expectations only to a limited degree. This is why adolescents often demonstrate poor impulse control combined with emotional impulsivity. The contact via digital media has the potential to increase this emotional impulsivity, causing teenagers to engage in behaviours they would not normally exhibit offline [ 39 ].

The defining element of cyber violence lies with its “digital context” which acquires the form of digital space and tools. Their impact goes far beyond the digital nature and takes on a psychological meaning manifested in the impact on neuronal processes [ 40 ] and the dynamics and quality of cognitive processes (attention, control, memory) [ 41 , 42 , 43 ]. At the same time, cyber-bullying participants remain under the influence of events, experiences and also peer norms or other phenomena embedded in the offline context. Such overlapping of the two realities and, depending on the approach, the mutual influence of various elements of either of such realities is verified, e.g., in the computer-mediated communication model [ 44 , 45 ] or social information processing” theory and Parasocial and Online Social Relationships Theory [ 46 ].

1.2.1. Studies on Psychological Aspect of Cyberbullying

Some research has shown the impact of digital tools and networked environment on how information is processed [ 41 ]. Their use leads to alternating attention and increased superficiality of information processing [ 40 , 42 ]. Moreover, the mediated character of online communication creates a sense of anonymity and deindividuation, which limits the sense of responsibility by generating a cockpit effect [ 47 , 48 ]. In addition, certain aspects of computer software and how online messages are constructed, as well as information overload, collectively marginalise reflective processes, intensifying impulsiveness and multi-tasking [ 49 , 50 ]. This limits the influence of the subject on the course of cognitive processes and the evaluation of results.

The ease of activating automatic adjustment [ 42 , 50 ] manifests itself in the use of the most accessible stimulus: physical appearance, especially in relation to peer violence. Physical appearance is the first and the most accessible attribute in interpersonal contacts [ 51 ]. It plays a special role in “forming impressions” about others [ 52 ] and is a distinctive aspect of social perception, especially in childhood [ 53 ]. People tend to see in it the symptoms of one’s predilections to certain behaviours. In addition, presumptions concerning one’s character or personality features are inferred from one’s appearance [ 54 ]. Finally, physicality is the basis of stereotypes [ 51 ]. Physical appearance traits are easily used (especially by adolescents) as the basis for stigmatisation that may lead to harassment [ 55 ].

Results of multiple studies show significance of online image in the context of cyberbullying. The online image is one of the targets of attacks of cyberbullies, who in particular focus on the aspects of physical appearance. Sharing photos or video content presenting the victim in unfavourable light has significant victimogenic potential [ 35 ]. Forwarding compromising photos is seen by young people as the most serious anti-social behavior [ 56 , 57 ]. Some researchers even claim that this form of bullying has a more negative impact on the victim than peer violence used in direct contact [ 58 ].

Data indicate the significance of psychological competences for involvement in cyberbullying: empathy is negatively correlated with cyberbullying [ 18 ] and with a lack of emotional control experienced by cyberbullying victims and perpetrators alike [ 59 ]. The research findings show that inducing various actions which activate empathy in the triad—perpetrator, victim, bystander—limits the scope of aggression experienced by children at school [ 60 ]. The role of empathy as a mechanism modifying the attitude of bystanders towards victims is also confirmed by the research outcome showing that children equipped with a lower capacity for empathic reacting and pro-social involvement [ 61 , 62 , 63 ] are rarely prone to support victims. A similar relationship was found with regard to electronic peer violence [ 64 ]. Experimental studies also demonstrate that situational empathy activation has an impact on adolescent decision whether to forward or refuse to forward peer-ridiculing messages. In the conditions of the arousal of both affective and cognitive empathy, a significant decrease in the frequency of forwarding an abusing message has been found [ 14 ].

Mediated interactions generate deficits in empathic arousal. Tools and the digital space marginalise reflexive functioning and intensify automatisms. To analyse peer cyberbullying from the perspective of participants in these interactions, taking into account their perception of psychological competences (empathy) and the status of physical appearance is crucial if we are to effectively address the problem of cyberbullying.

1.2.2. Current Study

The goal of exploring the specific aspects of cyberbullying and prevention measures viewed from both the students’ and teachers’ perspectives led to the research questions regarding subjectively perceived determinants of peer cyber-bullying and factors contributing to its escalation:

  • What forms of cyberbullying appear in adolescent narratives?
  • How are roles in traditional bullying and cyberbullying related?
  • To what extent appearance issues are a cause of cyberbullying?
  • To what extent is perpetration of cyberbullying intentional?
  • What role play the aspects of online and offline environment in cyberbullying engagement?
  • What is the role of bystanders of cyberbullying in adolescent narratives?
  • Is a level of selected psychological competence (e.g., empathy) associated with perpetration of cyberbullying?
  • From teenagers’ perspective, what is the role of teachers in the process of cyberbullying prevention?
  • What methodology of cyberbullying prevention is postulated by the participants?

2. Materials and Methods

A non-experimental study in the qualitative paradigm was planned. The semi-structured interview method was used. The study adopted a qualitative methodology to explore cyberbullying from the contextual perspective of various actors involved in the process (both students and teachers) [ 65 , 66 ]. Qualitative research design offers the opportunity to investigate bullying and peer aggression from the perspective of human interactions in a certain setting (e.g., school) and its cultural context [ 61 ]. Conversations and interviews create an opportunity to share one’s experiences with others, especially through constructing one’s own narrative [ 67 ]. Also worth mentioning is the usefulness of information obtained in this manner for the development and implementation of effective prevention and intervention strategies. Another advantage of the qualitative methodology, especially important in the context of adolescents assessed in the study, is its indirect character, which may lead to more open and sincere answers. In addition, the formal, linguistic aspect of the statements (available in qualitative methods) is a unique source of knowledge about how adolescents verbalise and structure their cyberbullying experiences—information which is not available through forms of measurement.

We aimed to cover all of the outlined topics during the semi-structured interviews, not in a predetermined order but rather following the flow of respondents’ narratives. The interviewers adopted a non-evaluative attitude and refrained from judgments and interpretations during the interview to assure safety and openness of the respondents who described their experiences concerning highly sensitive topics.

Participants and Procedure

The research participants were students (N = 55; 30 boys and 25 girls) aged 13–16 from 25 junior high schools across different regions of (blinded for the review) who had experienced cyberbullying acts as victims, perpetrators, or bystanders. The selection of schools was based on the following criteria to assure variance of the sample:

  • Size of town (schools from larger agglomerations: (blinded for the review), smaller cities: (blinded for the review), as well as suburban villages near to: (blinded for the review), and from the (blinded for the review);
  • Area of (blinded for the review) (central, southern, eastern);
  • Type of school (public vs. private junior high schools).

Two or three students were interviewed at each school. First, the headmaster was contacted and asked about cases of cyberbullying that had taken place in the two years preceding the study. The headmaster was then asked to check whether the parents of the students and the students themselves who had participated in the event would be willing to provide information to the researchers. In the event of initial consent, the researchers contacted the students’ parents/guardians and provided them with the necessary information about the study. After obtaining the parents’ consent, the researchers contacted the students asking for consent and arranging the date for the interview.

From the same schools, a convenience sample of teachers who had been involved in interventions in cyberbullying situations was selected (N = 45). The recruitment procedure was similar to the one for students. The teachers were also contacted after prior approval by the school headmaster.

Interviews were conducted from October 2015 to January 2016. The duration of the interviews ranged from 15 min to 1 h, depending on the willingness and readiness of the respondents.

The ethical procedure of the study included the following elements:

  • Consent of the Ethical Committee of the Faculty of Psychology at the University of (blinded for the review).
  • Consent of the parent(s)/guardian(s) in the case of students.
  • Voluntary participation and possibility to withdraw from the survey at any time.
  • Saving and publishing research material in a way that protects the anonymity of respondents.
  • Leaving the choice of method of documentation to the respondents (audio recording or written record).

Interviews were recorded and then transcribed, or their content was written down (depending on the respondent’s choice in this respect). Then the researchers read the responses and introduced categories for specific issues for analysis. The interviews were part of the Project (blinded for the review).

The transcripts were analysed using thematic analysis rooted in the constructivist paradigm [ 68 ]. This approach consists in identifying, analysing, and reporting patterns (themes) noted in the collected research materials. It is described as a method that allows for effectively identifying, ordering, and connecting diverse threads in rich, unorganised databases through a five-stage approach: compiling, disassembling, reassembling, interpreting, and concluding [ 69 ]. To answer the nine research questions, the analysis was carried out in the aforementioned stages by members of an interdisciplinary research team acting as competent judges (different from those in the first stage). In the event of incompatible assessments the final decision was made following consultations between judges and was based on mutual agreement.

Please note: G14, 18—Girl 14 y.o., interview number 18; (B15, 33)—Boy 15 y.o., interview number 33); (WT, 30)—Woman, Teacher, interview number 30; (MT, 25)—Man. Teacher, interview number 25.

3.1. The Forms of Cyberbullying in Adolescent Narratives: Between the Private and the Public

Analysis of narratives about cyberbullying acts shows that young people use a great variety of forms and technical methods to bully others online. An in-depth analysis led to drawing the main typology of those acts based on the type of computer-mediated communication (CMC) adopted: one-to-one online communication (perpetrator(s) to a victim) and public online communication. Additionally, the form of outing leading to exclusion was a popular topic in teenagers’ narratives. Young people used instruments that allow one-to-one communication, where the exchange of communication is restricted to sender and recipient.

The most unpleasant comments she sent me by private message on Facebook (G15, 16),
they wrote about her mother, that she had stolen something, etc. There were messages and pictures (…) sent privately (G15, 24).

Contrary to popular belief that cyberbullying usually involves publicly disseminated material, here the material is only known to those directly involved. The one-to-one mode of communication mostly meant that in the majority of cases the perpetrators were not anonymous, since they were sending messages from their accounts on social networking sites and were easy to identify. On the other hand, some perpetrators used channels that make hostile messages or other content (pictures, films) public. For example, they used the public conversation mode of some sites, where more than one person can read messages or communicate publicly (e.g., on so-called “walls” of social networking sites).

I have sent a modified picture of my friend in a group conversation (B14, 40).

One of the victims described it this way:

She posted sarcastic comments under my video on Facebook, such as: ‘How beautiful you are!’ or ‘Great idea! ’ (G15, 16),
My friend posted a video. And I commented as a joke: ‘You bitch from school’. She deleted the comment (B14, 45).

This distinction between private and public electronic peer violence acts is very useful from a conceptual perspective, since public mode adds new dimensions and mechanisms, primarily associated with the fact that other individuals (mostly students from the same peer group) join in the communication. Their involvement is usually described as adding additional unpleasant comments or backing up the initial perpetrators by “liking” their comments or disseminating the content further. This is particularly unpleasant for the victims when the material published is visual:

I spotted it on Facebook. And one girl was quarrelling that she didn’t want this photo up. That was her in her underpants (B15, 40), they often take photos during breaks, after training, or when somebody sleeps and then they edit them. It’s unfair. I often try to cover my face when I sleep (B14, 13).

There are cases when a perpetrator encourages other people to actively take part:

One was publishing a post and wrote ‘Please leave a like if you don’t like him’. And then the others joined and also asked for likes. And then the whole thread started (G13, 10).

In many cases, the public extended to people known from offline contexts, as the content was easy to access for others (e.g., friends of friends on social networking sites). This fact may make hostile acts potentially more harmful, since a victim may think that the content humiliating him/her is viewed and judged by a broader public and the “invisible audience”. In some cases, a victim has no access to actual content although he/she may be aware of the fact that others talk about him/her in a hostile way somewhere on the Internet:

I have a friend—I don’t know what he is about… He never liked me and started to taint my reputation and send out various things on social networking sites. One of them was Ask.fm—and people started to change the way they saw me, and that was not true… (G15, 17).

There are also forms of cyberbullying that skirt the borderline between public and private. The ones most often reported in interviews were identity theft and exclusion (ostracism). The first of these two is a cyberbullying act when someone takes over the account of the victim (e.g., stealing a password) and initiates on behalf of him/her private conversations or posts comments on social networking sites. These exchanges of messages are usually hostile towards other people, who erroneously think that they are sent by the victim. That means the reputation of the victim is endangered, since it is sometimes difficult to explain what actually happened and that a victim was not guilty. One drastic situation of this kind, when the content had been published openly, was described by one of the teachers:

One of my students forgot to log out from Facebook. The other student spotted this and started to publish stuff. (…) The content was sexual; it was not pleasant for anybody. It was about him changing his sexual orientation to a homosexual one (WT, 21).

In this particular case, the content was not only shared with other students but also the family of the victim, who alerted teachers at school about the situation. Another hybridised cyberbullying form of public and private electronic violence may take the form of exclusion:

She was banned from the class’s Facebook group. Then the girls started a new group. Everybody from the class was invited except her (MT, 7).

It is worth emphasising that in these particular cases perpetrators often used numerous technical channels and private and public ways of communicating harassment to a victim. However, in most cases one of the channels was dominant while others played a complementary role.

3.2. Offline Events as Causes of Cyberbullying

It follows from the analysis of the material that offline situations, i.e., real-life, face-to-face interactions are a source of cyberbullying. They are the source of conflict which is then transferred online, where it develops further. This phenomenon is exemplified by the response of one teacher: The conflict had been going on before; it didn’t start on the Internet (WT, 12). It sometimes happens that the perceived sources of cyberbullying are also rooted in the past. They concern previous experiences with peers that are implicitly reactivated in the context of a new stage of education. That was unfinished business from primary school (G14, 15). At times, violence starts online and is then transferred into the offline environment. They laughed at X during a group conversation but X didn’t know about it. Then it spread into the real world (B14, 20).

The responses suggest a variety of causes of bullying. They can be mundane, trivial quarrels and misunderstandings at school that are later picked up and continued in the form of posts on the Internet: (…) two girls had a fight at school and it turned into a war, and they continued with abusive messages on Facebook (B14, 6). The Internet is used as a forum to publicly harass through the way peers talk to one another in real world: We were posting pictures of how she was addressing us, e.g., “Dumb cooze” (G14, 14). Additionally, mutual hostility that escalates on the Internet where comments of people involved in various situations are posted: Basically, we never really liked each other. There was a book from the library that she’d checked out (…) the teacher reminded her a year later that she hadn’t returned it, she said she’d given it to me [the book—authors’ note] to return it, and I hadn’t. And then, when I was at the library, the teacher said the book was found, that she returned it (G14, 10).

Some acts of cyberbullying are amplified by parents who intervene by informing teachers about the negative experiences of their children. These situations result in comments among peers that constitute cyberbullying: (…) on the same day that my mom went to school to sort out the issue with the book, those [aggressive—authors’ note] questions were posted. The language was typical for that girl (G14, 10).

A recurring category of offline events that generate cyberbullying is that of direct interpersonal conflict. It becomes the source of negative emotions like jealousy, taking offense, providing motivation for behaviour aimed at humiliating, ridiculing, or taunting the target.

They found out that she, that friend of theirs, had other friends. Because she told them she also had other friends. (…) they couldn’t accept it (G14, 2).
(…) she showed screenshots of chats when they were calling me names. My friend also admitted that (…) she was badmouthing me because she was feeling offended (G13, 5).

Conflicts and resentment arising in offline situations may also provoke more violent forms of cyberbullying, specifically online hate speech.

I have two friends outside of school, they don’t like each other, they used to be friends, but one of them went nuts (…) and got into drugs, smoking, drinking (…). And they were hating on one another on Facebook, calling each other this and that. One would post that you are this and that and drop a like if you hate him, the other wrote that if you don’t like the first one, like my post and commenting started, a whole conversation, and then it got to the point where they stopped talking to each other and they broke all contact (B14, 6).

The participants pointed to offline conflicts and discord as sources of online aggression. The issues were often typical for this age group, involving quarrels over a girl/boy, jealousy, betrayal, taking offence, and seeking support from adults. The blending between the digital and the offline worlds is perceived and experienced, and the interaction between the two produces circumstances that trigger various symptoms of cyberbullying. This is clearly shown in a statement by one of the students: Your life on the Internet affects your personal life, here at school and outside of school… (G14, 14). This is also confirmed in the responses of teachers:

This conflict had been going on before; it didn’t start on the Internet. (…) then the next step was on the Internet (…) (WT, 12).
Sometimes they fight in real life and it spills over. And sometimes the fight starts on the Internet (MT, 3).
Perhaps the fact that aggression has moved to the Internet is the reason research shows reduced aggression, and we as teachers have noticed a similar trend, but it is simply going on elsewhere (MT, 7).

3.3. Appearance-Based Cyberbullying

Physical appearance traits easily dominate perceptions, thus giving a pretext for negative comments. This is well captured by one of the students’ statements: Different in some ways, often in appearance (B13, 11). Any deviation from so-called normal facial features is often immediately recognised and often becomes the object of nasty comments: (…) these are the kids from the inclusive classes, (…) they are typically on the receiving end of taunts because for them they are different, so this is the person to laugh at, make jokes about, that difference (WT, 20), or vulgar comments on physical attributes: Fat, greasy pig, dumb blonde (B15, 9).

Adversarial comments may also use embarrassing photographs, often purposefully distorted or modified.

He took a picture during class. It looked like I was picking my nose. He immediately posted it to Facebook. With a comment: ‘a pig in class’ (B15, 40),
(…) a girl uploaded a photograph and someone modified it maliciously (G13, 9),
in primary school, they were also photoshopping my pictures, but they deleted them quickly (…) Here, they also often take pictures of one another during recess, after training, or when someone is sleeping, and then they modify them… (B14, 13),
someone doodled something nasty on someone else’s picture, modified it, or they added captions to pictures, saying you are this and that (B14, 13).

The same is true of physical limitations: (…) the reason was short videos recorded by a girl who was excused from PE; she was a rather vicious person who was simply recording her friends struggling during PE. The girl who was being recorded (….) was particularly awkward and later a clip [was posted—authors’ note] showing how she is straining, trying to jump over the vaulting horse, doing other stuff (WT, 3), or untypical behaviour, She (the victim) is strange. Different or something. She behaves like… (unable to explain) (G14, 30), which becomes the reason for bullying.

3.4. Intentionality and Cyberbullying

Perpetration of cyberbullying, in the testimonials of Polish teenagers, rarely takes the form of intentional activity. Many bullies described their actions as impulsive, undertaken without planning, and with no intention to hurt another student. The following two accounts illustrate this point: Seriously, no, the other person did not take it seriously, because I wasn’t being serious. I called someone a “moron”, but later I started laughing about it with my friend and we started calling each other “moron” just for fun (G14, 20). There are these funny situations and you just post something with an inappropriate picture, on purpose, taunting someone, for example, about their name (B15, 18). Teachers express similar opinions, saying that online aggression for adolescents is often a form of entertainment (WT, 10) and joking (MT, 24).

Moreover, aggressive behaviour is often justified by teenagers as having been provoked by some stimulus, e.g., a communicative act by their victim on the Internet. They started calling our classmate names (online) because that guy from our class was calling them something, (…) someone said he was this and that, the other started calling him names and another printed what the other one wrote and complained to the teacher, he was summoned, so he came to school acting all sorry, thinking he was the victim (G 13, 27). In addition, young people say that this type of scenario often results in the escalation of the conflict. He was her ex-boyfriend (…) it was just out of anger because he broke up with her or something and so it happened/friends of that girl went after that boy, so the friends of that boy went after the friends of that girl for picking on him, and it was like this vicious circle (B15, 26). When describing the vicious circle, teachers mention that, with each retaliation, the students are more and more cruel (WT, 23).

Another frequently mentioned feature of cyberbullying among peers is the inclination to blame the victim: If she wasn’t keeping to herself so much, it would have been different (G14, 26); She shouldn’t have told her mom, who made a big deal out of it (B14, 45). The teenagers in our interviews have a way of talking about victims that appears to ignore their emotional perspective: She (the victim) is strange. Different or something. She behaves like… (G14, 30). Teachers’ statements also identify the students’ distant attitude towards the victim: It’s difficult to get through to that person (victim) (WT, 23), sometimes echoed by the teaching staff: You cannot help someone against their will (MT, 24).

Bullies often struggle to explain the motivation behind their actions. When asked about it, some answered I don’t know, I just did it (B14, 44) mainly due to distancing and avoiding. Such phenomena may result from moral disengagement, a situation-based cognitive reconstruction that leads to positive or neutral attributions of moral transgression and violence approval, which is confirmed by other participants, i.e., student bystanders who are only describing what they saw: (they do) the first thing that comes to mind, without regard for consequences (G16, 33), and school teachers/counsellors/psychologists: I don’t think they realised it was hurtful (…) I’d say in most cases it is the failure to realise, not just that they are breaking the law, but not realising how they are hurting someone else (MT, 7).

Cyberperpetrators often become aware of potential consequences for the victim only when he or she talks about them directly or when someone else (e.g., the parent of the student who has been the target of cyberbullying) brings up this issue: While I was having ‘fun’ with others (co-perpetrators), I wasn’t feeling sorry for her. But then I started feeling sorry for her (G14, 26). In some cases, bullies fail to appreciate the harm they have caused even after some time has passed (even despite clear evidence). But there was no fighting and no one got hurt (B14, 45). When that happens, an apology tends to be forced, artificial, and rarely leads to actual improvements in peer relations: They said they were sorry, but they were afraid. They said sorry, but it was forced because they got scared and only then deleted all the comments, but by then there were screenshots (G14, 44); I apologised to her on Facebook, making it look as if it were my idea, so as not to get into more trouble (…) It was better to do it on the Internet (B14, 45).

3.5. Online Environment and Social Influence as the Sources of Cyberbullying

The digital environment and electronic devices create specific conditions that induce adolescents to engage in negative and inappropriate behaviour. The sense of anonymity offered by the Internet facilitates actions that violate social norms. (…) there they could feel, they thought they would be anonymous, that they would get away with it (WT, 12) or as a student notes it is simply easier to write certain things than to say them to someone’s face (G14, 4). Writing on the Internet is a massacre; it’s spreading (G14, 6). It also creates opportunities for those who have little chance to express aggression in real life: Shy people are more likely to talk back on the Internet than in real life (B14, 24).

Teachers also point to digital communication as conducive to the brutalisation of peer relations: but discussion forums are also the place where vulgarisms appear and students are offended. The thing is we do not know who the person we are dealing with really is. (WT, 2). Technological advances offered by the Internet carry a potential for harming others: (…) in my opinion the fashion for showing one’s pictures and reporting on almost every minute of one’s life and competing for the number of “likes” is a tremendous threat (WT, 14). The teacher also stresses the negative role of social networks: (…) first and foremost all those social networks that cause so much harm to children (MT, 2).

On the other hand, reports provide material in support of the overpowering authority of the peer group for engaging in reinforcement or perpetration of cyberbullying. The commonness of a given behaviour within a group institutes a kind of social norm that serves as a standard for behaviour. Criticism is limited, and the dominant attitudes are conformism, as well as impulsive reproduction of the behaviour within the peer group. We’re all doing it for fun and no one takes offense... It didn’t occur to me at all that he could be angry about it. I got pranked like that as well, and maybe it felt a little uncomfortable, but when I saw everybody was doing it, I relaxed and made no fuss about it (B14, 9).

Some people said I was exaggerating because everybody was doing it and I was the only one to take offence (B14, 18).
(…) I don’t know how she could take offence, all my friends were surprised (B14, 24).
When girls and boys started reminiscing about it all, I was really upset; I didn’t know what to do… I was crying (G14, 15).
There is peer pressure (WT, 23).

What is more, the victims’ reports suggest that even if the expressions of cyberbullying are privately renounced by adolescents, it has little impact on their behaviour. Despite the sense of unease associated with hurting others, they replicate that behaviour for fear of being criticised by the group and for the need for social approval and affiliation. Some were saying that, for a long time, they had been feeling uncomfortable when pictures and comments were directed at them, but they didn’t say anything, because nobody did. And so it started to look like everybody was having fun (B14, 9).

I don’t intervene in any way or else I’ll get blamed as soon as I have a problem myself (B13, 1).

The mechanism of generating such a group is often underpinned by fear and group exclusion anxiety. It is revealed in a statement by one of the teachers: One person likes tormenting others. Other girls joined in so as not to get on her wrong side. (…) They are more powerful as a group, they feel strong (WT, 30)

Cyberviolence can also be triggered by a group that is established to fulfil this very aim, i.e., doing harm (perceived, obviously, as having fun). The consequences of the operation of such groups are subjectively experienced by the victim as particularly distressing. They set up this group [on Facebook—authors’ note] and humiliated me on that group together with others. I felt horrible. I was psychologically vulnerable and every insult was getting to me. So when I read all those comments on that group and all that, let me tell you, I didn’t feel like going to school, I just didn’t want to be seen (G14, 15).

Distancing oneself from a close-knit peer group is sometimes seen as a violation of unspoken rules and often gets punished online. This is illustrated by a girl’s statement, which reveals reasons for cyberbullying: If she wasn’t keeping to herself… (G14, 24). Groups also punish members for breaking the rule of not notifying adults about peer behaviour: We knew she was talking (with adults about the matter). She should have talked to us (G14, 14). This aspect of social pressure is captured perfectly in the following statement by a teacher: I think there is great fear of being the same as the person targeted, they stick to that one way or another, taking the side of those acting cool and seen as funny (WT, 1).

3.6. The Role of Bystanders in Cyberbullying Dynamics

The statements of young people in our qualitative research also suggested that the actions of bystanders are of key importance in the dynamics of online aggression: Some people support them, others post comments for them to stop and calm down, and there is a third group that sees everything but does not respond (B14, 4) ; Everyone picks the side they want to be on, I have my friends, she has hers, they will obviously be on her side, and my friends on mine. And then there are the bystanders, those who are, shall we say, not associated with either of us, I heard they were making fun of her for taking offense for this sort of thing (G14, 19). In the accounts of teachers, it is not the victim but teenage bystanders who are the most likely to intervene when someone is targeted online: Witnesses, more often than victims, come with screenshots and files on pen drives. It’s a measure of our success that children know what to do. This is thanks to teachers’ training (WT, 24) ; In most cases, we find out from other students (MT, 25). The role of bystanders can have a prosocial impact, as in the following account, where they actively defend the victim: When someone was criticising some post because it was poorly written, I defended the person that was criticised (B15, 6).

However, passive behaviour is a much more common response: When I saw that, I just ignored it, because I didn’t want to make it worse for her by taking part (B13, 1) ; I don’t intervene in any way, or else I’ll get blamed as soon as I have a problem myself (B15, 2). Defending might be perceived as risky, since the bystanders have to challenge popular, powerful bullies—which requires both skill and courage. This is apparent in the following account by a young girl: These girls that were gossiping online are seen as dominant, they get even, they ridicule others. Nobody responds for fear of retaliation (G14, 20). Thus, it may seem more reasonable and safer to remain neutral as a cyberbystander and to avoid the company of low-status victims, or even to support the bullies. This behaviour can be also interpreted via the social influence and peer pressure mechanisms confirming the complexity of mechanisms underlying online teenage bullying. As teenagers observe and monitor each other’s reactions to cyberbullying episodes, they might conclude that a lack of defensive actions is because the majority approve of what goes on. Young people we interviewed stated that for a bystander to intervene takes strength and courage: In primary school, I had this classmate who was in his world and others were making fun of him and taking pictures of him. I reacted by saying that it was idiotic to take pictures of someone against their will only because they were acting strange. These images were never uploaded, by the way (G13, 9) , as well as specific values and model behaviours that may solve the problem not only for the victim but sometimes also save the bully from the painful consequences of his or her actions, as is illustrated by the following statements: Some people have their heads on straight and they can help. And they did, and so I wrote to that person and apologised, and it all turned out well (B15, 5) ; I started having second thoughts when older guys made me realize what I had done. That I’m younger, and I’m the one who’s mocking (G15, 25).

When they do take action, bystanders in cyberbullying cases collected in our research were more likely to join the bullies and reinforce the victimisation rather than help the victim. Bystanders’ active participation in the victim’s persecution can manifest both offline: I was in trouble both online and at school. The girls in other classes who were reading the comments would whisper to one another when they passed me. They didn’t do anything to me, just whispered (G14, 44) , and online: It was funny. I usually joined in (on Facebook) (G14, 26). The actions often take the form of harming the victim thoughtlessly and reflexively: I mean, you don’t think what you “like”, you just give likes to everything? In general, I click like on everything. Why shouldn’t I? (G13, 10). Teachers also emphasised the role of group mechanisms that may intensify thoughtless antisocial actions of cyberbystanders: There is peer pressure. When confronted individually, they seem to realise [what they are doing—authors’ note] (WT, 23). This corresponds with a well-established mechanism, which is also true for offline bullying. In both contexts group norms concerning bullying and peer group, hierarchical structures influence bystanders’ willingness to defend the victim.

Another important feature of cyberbullying that emerged in the interviews was role overlap. This overlap, or even evolution within a given role, seems particularly pronounced in the case of cyberbystanders, and is to a large extent a consequence of role ambiguity. The unique character of online environment and the way people function in cyberspace means that, unlike in direct interactions, boundaries between roles are blurred, which young people describe as follows: I don’t know, I try to avoid those situations and not get involved because sometimes I like both people and I don’t know whose side to take. And sometimes it’s hard to be objective (B14, 3). A good illustration of role evolution typical for bystanders is the story of an individual who started as a bystander adding to the cybervictimisation of the victim ( reinforcer ), then offered support to the victim and reported the case ( defender ), but in legal proceedings was eventually declared to be an accomplice: This picture was sent to me as well, and I forwarded it to one other girl. I sent it to her, and she went all in, because she sent it to everyone, even to people who didn’t know her. I mean, this is no excuse, because I also did something wrong by passing it on (…) and this is why we have to appear in court soon. … (Then) I started feeling sorry for her, so many people have seen it and laughed at her (…) I wanted to help her so it wouldn’t get worse and so people would no longer mock her, but the school counsellor talked to them and said they were to stop it and start helping that girl (G, 13, 9).

The transition towards prosocial behaviours in the accounts of teenagers contains themes of affection, empathy, and regret: I started feeling sorry for her, so many people have seen it and laughed at her (…) It was funny at the time, but part of me wanted to make sure more people wouldn’t see it, so I told the teacher. After all, I like her (G13, 9). The teenagers also made references to schoolmates’ solidarity and positive peer norms that disapprove of violence. Maybe not in online comments, but in private they did, my friends. To show their solidarity in this conflict, they recorded a similar video and posted it just for laughs on their profiles, to show that they too could imitate the same as me. This was a positive response. They were very supportive of those two close girlfriends of mine (G14, 19). With respect to generating positive, prosocial norms of behaviour, i.e., responding to violence, teachers emphasise the importance of modelling such behaviours among peers, which helps overcome the pervasive indifference towards acts of cyberbullying: All it takes is writing that you are not cool with what is going on and that your opinion is different. It’s like opening a door so that the next person finds it easier (WT, 4).

3.7. Lack of Particular Psychological Competences as a Source of Cyberbullying

Deficits in adolescents in terms of empathically responding to a peer’s discomfort are often mentioned in the accounts of teachers and labelled in a variety of ways, e.g., as lack of awareness: (…) they didn’t realise (…) (MT, 9) , they don’t do it maliciously (…) they do it as a joke (MT, 10), I think it usually results from lack of awareness, but not only of the fact that they could be breaking the law, but the lack of understanding how one person can hurt another (MT, 9) , cruelty, Young people are cruel (WT, 14), or joking, for him it was a good joke (WT, 12) , these youngsters treated it as a joke (WT, 14) , It’s a form of entertainment (WT, 15), Yes, it was a picture and what can I say… You know, it was an opportunity to have some fun, so I did (G15, 12). A telling symptom is that even personal, negative experiences of victimisation fail to engender positive, empathic responses: I felt really stupid, you know, how I could have behaved that way, having been treated like that by others, knowing how the other person must be feeling. It was just this reflexive action (G15, 12). In other words, one of the key learning mechanisms of cognitive empathy, namely, one’s own experience can be inhibited in the digital environment.

The suffering of others is often overlooked, unnoticed, and, most importantly, not anticipated. Even external intervention containing a message about the state of the other person does not later arouse empathy, but fear focusing on the Self: They said they were sorry, but they were afraid. The apology was forced because they got scared (…) (G14, 24). I apologised to her on Facebook as if it were my idea, to make it go away, it was better [to apologise—authors’ note] on the Internet (B14, 24).

The reports by teachers point to egocentric projection as the basis for anticipating the states of others: for him, it was a joke, he didn’t see it as hurting his friend (…) he thought his friend would be laughing as well. That’s how it was. He saw nothing wrong with it (WT, 2). Taking a group’s standards as the reference point favours a reinterpretation of bullying: It didn’t occur to me at all that he could be angry about it. They had pranked me like that as well, and maybe it felt a little uncomfortable, but when I saw everybody doing it, I relaxed and made no fuss about it (B14, 9). Friends were saying ‘how could someone take offense at that’ (B14, 24). This justifies negative behaviour and inhibits empathy as a response.

Perpetrators’ statements showed inadequate perception of their behaviour as benign. They tend to think that their actions bring no harm to others: I mean, that’s why you send those jokes. It’s like a game, a conversation; you wonder what the other person comes up with. It’s like a competition, but mainly just a joke (B14, 9).

The categories used in descriptions of other people’s discomfort are vague and unspecific: she wasn’t feeling great, it wasn’t fun for him (B14, 9) or I don’t think he felt cool (B14, 8), (…) he was not doing well (G14, 15). A teacher’s statement confirms this interpretation: I think they can’t call it (WT, 13).

The analysis of language used by adolescents indicates difficulties in verbalising the affective states of peers (emotions or moods). This seems to be an important factor inhibiting the activation of reflective (cognitive) empathy with its underlying concept code. The problem with naming peers’ affective states is due no to ignorance of these categories but rather to their selective availability. There is a clear asymmetry between the descriptions of perpetrators and victims. Victims verbalise their affective states precisely and appropriately: I felt sad that he humiliated me in this way, (…) also ashamed—after all, someone was sort of fiddling with my picture, used it and modified it just for laughs (…) then I was simply mad, I think (…) (B14, 9), I was really upset, I didn’t know what to do… I was crying (G14, 14) ; For me, it was mostly about health, it was really stressful (…) I generally tend to get sick from time to time, and when he started all that, it got worse and I had terrible headaches, almost to the point of fainting (G15, 8). The perpetrators’ reports are unspecific, general, and inadequate. The difference in perspective is hardly surprising, given what we know about egocentrism in adolescence.

In some cases, cyberbullying gets reinterpreted and becomes transformed: But there was no fighting and no one got hurt (G14, 24). This statement clearly shows that the consequences of offline physical violence are directly available and therefore have greater regulatory potential. Online violence lacks that spectacular expression, making its symptoms more difficult to spot and more susceptible to reinterpretation.

The analysis of teachers’ statements confirms deficits in control and behavioural inhibition: And when they get angry, they either start fighting and brawling, or they take the phone and write to one another. On Messenger I think (B14, 6); Recently, there’s been a fight, and it also started on Facebook, because the boys put each other through the wringer so much that when they met in real life, fighting ensued. (…) Those three said they were provoking and they apologised, they should not have provoked and the other one shouldn’t have hit them or shouldn’t have let himself be provoked and we decided that was his weakness, he gets provoked, so when he is ready to get physical, he is to turn on the spot and come to me or his friend (MT, 3).

The statements of adolescents indirectly suggest that their behaviour online is typified by the lack of thought about its consequences: It hadn’t occurred to me what someone else could feel (B14, 9). Impulsivity and reactivity are manifested by the widespread use of vulgarisms: I saw her post the video and this jester’s nature awoke in me, and so I wrote ‘you cunt’ to her (B14, 24). Negative, vulgar expressions dominate communication (…) Your face is like a vomited, expired squirrel cutlet; Why weren’t you at school you prick; I can’t bear to look at your mug, you must be a faggot (WT, 6). Impulsivity and lack of control are also manifested in problems with clear and logical verbalisation of thoughts, causal formulation of narration. They include large numbers of interjections and digressions, confounding the argument and detracting from its communicative value. The reports indicate the dominant role of automatic regulation, deficits in attention control, and routine and repetitive behaviour: I, for one, am in this group on Facebook called “Fame Seekers,” and there (…) we like each other’s photographs. I don’t even look at them, just click like, like, like immediately (G13, 5).

3.8. The Role of Teachers in the Process of Cyberbullying Prevention

The material collected includes a number of thematic threads pertaining not only to acts against violence but also to education and prevention. The school counsellor always helps us (…) There were talks with the counsellor and she persuaded us to stop bullying this girl [i.e., the victim—authors’ note] and to accept her instead, and this was a breakthrough, at the beginning it seemed funny, so we were sharing it, and only then most people understood that it may not be cool or funny (G13, 9).

An important factor in preventing situations potentially leading to peer violence and providing solutions to them is a proactive approach by the teacher, which may involve the use of social media, not only as a platform for conveying instructional materials but primarily as a tool for promoting educational goals and building social bonds with young people. I’m on Facebook as a school counsellor. I keep this account just for my students, next to my private account. (…) They do write various things on their walls and being on Facebook allows me to pick up on what’s going on with them. So I contact them in private and write that I can see that they are sad, and I offer my help, to which they typically reply that they would like to come and talk (WT, 21) ; I write to the sender that this post should not perhaps have appeared when I notice something on the school Facebook group (MT, 7).

As the collected data indicate, the victims and witnesses of cyberbullying seek help from adults: the majority of respondents reported an act of cyberbullying to an adult person—a parent and/or teacher/school counsellor, especially if the act was highly victimising. Those who come are mostly victims, sometimes also witnesses (…) these kids know that they can get help here (MT, 7); From the very beginning I kept my mum informed and we went to see the teacher together the next day (G14, 44). The interviewees note a positive tendency to turn to adults for assistance: It seems to me that students’ attitude towards teachers and parents has changed for the better. Now they tend to see adults as competent users of the Internet, who know what goes on there, and not like some aliens from a completely different world (MT, 6). How adults are contacted by the victims and witnesses of cyberbullying depends on many factors and may not involve face-to-face interaction. It depends on the circumstances on both sides. Those involved may do it directly or through their mates. Sometimes they put an anonymous note under your door saying that there is a problem and asking you to visit a website and see (…) (WT, 21). The main criteria based on which adolescents choose the addressee of their request for help are trust and expectation of an adequate response (i.e., lack of exaggeration and being discreet). A friend of mine went to see the school counsellor, who then called that guy [the perpetrator—authors’ note] and they simply had a conversation (MT, 13).

As the material obtained in the study indicates, present-day educational goals can be achieved thanks to a significant presence of adults both on the Internet and offline, as evidenced by this testimony of a young person: One of the coaches is my Facebook friend. He’s an active Facebooker (…) and president of the sports club, posting a lot of sports events and some info about the club (…) (B15, 12). Even though such activities may not seem to be strictly connected with counteracting cyberbullying, they are a form of what is known as positive prevention, which relies on the enhancement of individuals’ resources. The relationship between an adult educator and a young person provides many opportunities to strengthen the potential of the latter, with the Internet being a convenient medium for prevention and with teachers availing themselves of the “bright side” of social media: For young people, the Internet is a socialising space, a source of information and personality development. Internet activities are an alternative to ‘doing stupid things’ (G15, 8). The next statement by a school counsellor demonstrates the awareness that well-established bonds with young people should be perceived as an important protective factor: When you have good contact with them, they indeed come (to talk about various problems) (WT, 24).

Recognition of the Internet as a platform for building positive peer relationships in virtual communities, whether they are the sole form of contact between peers or complement an existing offline relationship, can be seen in this statement provided by a school employee: I know and it is really interesting for me that kids establish such class groups with teachers. There’s a group admin and a vice-admin who post reminders about class tests. When someone has missed classes they ask others what the lesson was about, so this group is really helpful as a source of information about the current class and school affairs. Some teachers are members of such groups and others, who are not, may be informed by students about what is going on in the class social media (WT, 16).

It is crucial for teachers to be aware of the fact that they have to identify students who are likely to become victims, bearing in mind that cyberbullying is often a mere extension of traditional forms of peer violence. Victims are typically chosen from the group of pupils with a weak position in the class. They become victims of aggression; you don’t attack someone strong (WT, 24). Some of the interviewees seem to notice opportunities in online activities typically seen as dangerous or morally dubious, such as online games: playing games supplied by foreign servers, he had to learn the language and his English improved in writing and speech (WT, 15). Another statement showing appreciation of the opportunities offered by the Internet for developing interests and training social skills is this: (…) [The Internet –authors’ note] is a space, where—I can see that—even kids who seem to not have any hobbies, get interested in something. They come across videos showing people doing some things and they get inspired to develop some new interests. They are looking for information, they want to discover something about the world (…) after some searching they may find something they will start to identify with; (…) They work through everything that happened in the school, using their specific language, of course. Perhaps they are venting their anger and other emotions that arose in them in response to what happened in the school but they could not show their reaction in front of the teacher. This is very frequent in such groups (WT, 16).

3.9. The Methodology of Cyberbullying Prevention—Perception, and Expectations

In the light of the collected material, both the preventative and interventional measures undertaken at school are often rooted in punitive, retributive philosophy. The following testimony corroborates this observation: I think we’ve had one class [about cyberbullying—authors’ note] and we were threatened with the perspective of dealing with a prosecutor (G14, 26) ; One student was told that he would get a low conduct mark but ultimately he got a good one; Each school has a statute based on education law and the only penalties stipulated in the statute are the teacher’s or head’s reprimand, so they were officially reprimanded. Because the situation took place in the spring, they got low conduct marks at the end of the year—if you get an official reprimand, the final conduct mark has to be the lowest on the scale. But students couldn’t care less. Penalties don’t work, their effect is zero (WT, 12). Anti-cyberbullying actions are typically undertaken post factum, rather than as preventive measures: Students were bullying another student on Facebook (…) The class teacher asked me if I could do something about it. So I said I’d devote a class to this problem (MT, 7).

Another recurrent topic in the material under analysis was that of divergences between young people and adults concerning their respective assessment of frequency, appeal, and efficiency of prevention and intervention actions. And the next day after the lesson the fake account of that student was deleted. So they got the message (MT, 8) ; We did have such classes but not many. We wrote something, we talked, and played the game called “Mafia”. These activities were supposed to build a bond among us, but they didn’t change much. We surely won’t miss each other (G14, 30). These statements, however, were produced in different situations and conclusions should be drawn with caution. Another testimony given by a student exemplifies the ambivalence in assessing the effectiveness of interventions undertaken at school: In fact, little was done at school in my opinion, lowering the conduct mark didn’t have any effect because it was not on his certificate. His parents weren’t even notified; he only talked to a psychologist. Well, our relationship got better; he stopped doing what he used to do, so it really is better for me, but on the other hand… (G15, 17).

One of the most important conclusions supported by the young people’s testimonies is that educational meetings about violence prevention are typically conducted in the form of lectures and they inspire little interest on the part of participants: Not very interesting. The teacher just talked to us (G14, 26) ; They could organise it differently. It’s mainly theory (B14, 28). Furthermore, the content of such lectures is often considered to be abstract and quite far removed from reality: We had classes on how to use the Internet in a safe way, conducted by some teachers. And they weren’t really interesting. They should talk about situations in which we can find ourselves and, for instance, how to solve problems. What we heard instead was that the Internet is something blah blah and that it cannot be deceived (B14,16) ; we had lessons on cyberbullying too, both with people specially invited to our school and as part of the IT course, most basic stuff (…) It was a talk (…) generally we weren’t listening too closely (…) it was just obvious things, like if we notice someone is being abused we have to report it, but surely we don’t need to be told such obvious things … (G13, 39). These statements point to a discrepancy in perspectives (of students and teachers) from which the prevention of cyberbullying is approached.

Ambivalence can also be found in the students’ evaluation of the usefulness of educational meetings on violence prevention: The meetings are obligatory so we attend. Cool, classes are cancelled during those meetings (B14, 28) but also: We miss important classes, and then we are behind on the material (G14, 30). The meetings are typically described as boring and largely ineffective: These meetings are not particularly successful (B14, 28); It’s neither interesting nor encouraging (G14, 30) ; There are boring programs—some people talked about something (B14, 45). These statements illustrate the perceived passive character of efforts that make no use of young people’s activity and involvement. Efforts of this kind are not suitable for the existing challenges. Due to the fully controlled nature of this kind of address, a lecture is a “safe” form of delivery for the teacher. When the meetings are well designed and prepared, they do exert a real positive influence, as noted by this student: [after a class on cyberbullying—author’s note] our understanding and acceptance increased (…) people no longer tease this girl but they are trying to help her (G14, 20).

According to individual teachers, intervention measures are often graded (e.g., a reprimand first, then being summoned by the school headmaster, notifying parents, and finally informing external authorities), as this statement indicates: if I have a perpetrator, I have to scare them off first, my aim is to make sure that what they did will not happen again. I don’t want to appeal to their emotions because it would take longer and may not have an immediate effect, but my method is effective—the perpetrator gets it at once. Further work may also be necessary, but most of the time the first step is sufficient (MT, 7).

Many students participating in the study point out that effective cyberbullying prevention, or, more broadly, Internet threat prevention is necessary. More specifically, they suggested that cyberbullying prevention should be carried out through the same medium in which it occurs: the Internet should be discussed on the Internet (B14, 11). Interviewees expressed expectations related to the interactive character of the medium, its attractiveness, and motivational systems: a lot of videos and rewards (G15, 25). It is also necessary to recognise the varied character of young people’s educational needs, and the limitations of preventive actions carried out sporadically, as evidenced by this statement: I know my peers and I know that such a film [about a woman being a victim to cyber aggression—authors’ note] won’t change their conduct on the Internet (B13, 8). This might point towards a tendency in educational work to use stereotypical cases that do not stimulate reflection or can even promote habituation—a desensitisation to exposure to others’ discomfort.

Using narratives based on authentic experience in planning prevention can be conducive to its effectiveness. The need to have educational materials illustrated with examples is also reflected in the following statements: It would be much better if those directly involved had a voice (B14, 28); Better give examples—it’s more interesting (B14, 45). Young people’s suggestions include greater interactivity and a strong emotional context, as reflected in this statement: More communication with the instructor. To encourage those who would like to take an active part but won’t volunteer (G14, 29); Avoid showing slides. Somebody should talk without shying away from graphic details (G14, 30). Well-thought-out use of knowledge obtained from students—addressees of prevention measures—in designing anti-violence programs should contribute to their effectiveness. Being open to the addressees’ perspective helps in obtaining precious knowledge about whom they follow on social media and who is, therefore, an idol and authority figure for them: Serafin is a Youtuber making funny videos that he posts as comments about the hits of the Internet. But recently he started posting more serious stuff, for example, about refugees or the school system reform (G15, 16). Another advantage following from diagnosing young people’s needs regarding violence prevention is becoming familiar with specific topics and problems that can be taken up in school activities, such as debates or workshops: It should contain a definition and deal with privacy issues, such as the degree of privacy on Facebook so that we can find out what others know about us and what can happen. Not everybody is aware that photos and posts they upload can be seen not only by their friends but also by strangers (G14, 10); I think that posting those silly videos should be restricted, so when a stranger decides to watch something like that, they would have to accept it, it’s just stupid and unnecessary. People have no sense of shame today and post anything; it didn’t use to be like that … (G14, 2).

4. Discussion

The aim of our qualitative projects was to gain a more in-depth understanding of the phenomenon of peer cyberbullying: its features, conditions, and relations with the offline reality, from the perspective of young people involved in different roles in cyberbullying as well as their teachers. Our analyses confirmed the legitimacy of taking up the issues contained in the research questions.

Based on our results, we can conclude that both forms of cyberbullying via private identifiable means and public communication channels are used. This latter could be interpreted as an online version of indirect bullying, establishing negative attitudes against the victim and opening the door to other direct forms of bullying [ 70 ]. From a practical perspective, both identified forms of cyberbullying need to be addressed separately through effective prevention and intervention strategies. This is due to different underlying mechanisms and coping strategies that are based on different types of online communication. This is mainly connected to public dimension of some cyberbullying acts that made them more severe in terms of victimisation [ 71 ].

Offline situations as the cause of aggression exhibited on the internet seem to explain what teachers describe as declining aggression in direct contact. It would therefore seem that aggression has not diminished, but rather transformed, migrating into the digital space [ 72 ]. The opposite direction has been very rare—still we have found testimonials when young people situated origins of bullying online—e.g., in closed classroom fora.

Victims of bullying often go on to become bullies themselves, while perpetrators are victimised, with offline problems replacing online ones, and vice versa. Substantial evidence points to various links between offline and online bullying roles in terms of cyberperpetration as a predictor of traditional school bullying, traditional school bullying perpetration experience as a cyberperpetration predictor, and links between the roles (the bully–victim status) [ 30 , 73 ].

Generally, our findings help interpret the results of much quantitative research, which often finds an overlap between offline bullying and online bullying [ 21 , 74 , 75 ]. Effective prevention programs should therefore also acknowledge offline situations viewed as a potential source of cyber-bullying.

Our analyses confirm that social media is perceived and used by young people as a space for presenting visual aspects, including external appearance. With its open and interactive nature, social media is an ideal arena for self-presentation and publishing photos ridiculing others. Both forms of activity exploiting the external appearance fulfil the self-valorisation function and serve as a status generating tool in the Internet, with the latter being a particularly acute form of cyber-violence.

Many expressions of cyberbullying are aimed at the features of physical appearance. This is confirmed by the salience of physical features in social perception [ 51 ]. Appearance-related attributes are very “concrete” and stereotyped in their nature: they dominate perceptions and become an easy excuse for derisive comments. Additionally, our findings showcase the need to emphasise the topic of cautious online self-presentation in cyberbullying prevention programs. It remains equally important to emphasise a simplified character of inferring about a person’s traits based on his/her physical attributes [ 55 ]. Materials and exercises that reveal the superficiality and inadequacy of such a strategy may cause addressees to reflect upon their behaviour and re-examine reasons for cyber violence.

From the data collected in the interviews, we can conclude that both bullies and bystanders, whether adult or adolescent, tend to describe the perpetration of bullying as thoughtless, unintentional, and unpremeditated. These results provide evidence for the need to implement non-restrictive no-blame approaches for perpetrators in cyberbullying prevention and intervention actions. Other data clearly show that the dynamics of cyberbullying cases are dependent upon other unintentional factors, such as specific technological settings, friend vs. acquaintance of the cybervictim, the bully’s popularity, clear vs. unclear circumstances, perceived fairness of the behaviour of the involved parties, directness or proximity to the cybervictim, the severity of the act, etc., which influence the process and the outcomes of bullying acts [ 36 , 37 ]. Those mechanisms spark a tendency to blame the victim and adopt attributions that show emotional and rational distance. That was partially proved by results of other studies suggesting that students avoid victims, especially in classes with strong status hierarchies and imbalance of power, where friendship with victims increases the risk of loss of position and being victimised oneself, which makes the likelihood of intervention low, as bullies select victims with few or no friends [ 76 ].

In some cases, bullies fail to appreciate the harm they have caused even after some time has passed (even despite clear evidence). This stands in line with quantitative data on moral disengagement of cyberperpetrators [ 77 ], which is higher and much easier in the online context due to reduced social and contextual cues available [ 78 ].

The adolescents’ and teachers’ statements confirm that the specifics of communication mediated by digital tools create particular circumstances that facilitate behaviour that reinforces online aggression. The content of the narratives usually suggests that peer violence on the Internet is viewed not as a category of behaviour, but unrelated, isolated acts of violence, each of which has a unique context. The adolescents failed to draw more general conclusions, e.g., about the category of situations that trigger aggression. However, many accounts contain a more or less openly expressed intuition that the specifics of the online environment facilitate involvement in and reinforcement of bullying. These findings correspond with many previous reports pointing out that the sense of anonymity (sometimes present even in situations when a perpetrator is known to a victim) concerning both parties in the interaction is a key modifier of mediated communication [ 48 , 79 ]. Based on these results, enhancing teenagers’ knowledge on the impact of computer-mediated communication on their behaviour seems an important condition for an effective approach to reducing online aggression.

Another aspect of the analysis of collected material suggests that the peer group active online is perceived as the source of norms that regulate behaviour, which is especially apparent when computer mediated communication is used. Harmful online behaviour subordinated to peer norms increased victimisation. The universality of peer standards and fear of consequences of exclusion seem to justify and, at the same time, be the cause of negative actions on the Internet. This is why it is crucial to take into account the dynamics and significance of peer group in developing effective cyberbullying prevention programs. Particularly important is raising awareness concerning peer influence and the automatic and impulsive online behaviour that may be caused by it.

Our results highlight the importance of bystanders’ reactions to cyberbullying as a powerful social influence mechanism in creating positive anti-bullying behavioural models [ 14 , 30 , 36 , 80 ]. The collected findings on the role of bystanders stand in line with the knowledge of the bystander effect [ 81 ] when those who witness bullying shift responsibility for responding to it to the teacher or the victim’s friends [ 61 ]. Bullies are accepted according to pro-bullying class norms with certain strategies or unintentional actions, bystanders can reinforce bullies or support and defend their victims, both online and offline [ 82 ]. It underlines different factors and mechanisms operating in school class contexts that influence bystanders’ behaviour: adherence to peer group norms; perception of group hierarchy; homophily; pluralistic ignorance; bystander effect; social identity; and moral disengagement among adolescents, which might contribute to how bullying is perceived, shape responses to it, and explain why it is so pervasive [ 83 ].

Analysis of the statements indicates control and inhibition deficits. They increase the probability to engage in hostile online behaviour. The control functions, as well as empathy, are subject to changes through education programs. Therefore, it is of crucial importance for the prevention programs to include strategies directed at enhancing various manifestations of executive functions. These should include improvements to implementation plans and strategies, operational memory, and mindfulness training [ 84 ]. Additionally, the kind of preventive measures that include the element of induction appear to optimise empathy [ 85 ]. Cognitive empathy responses, especially role-taking, are shaped by environmental factors, i.e., parental and teachers influence and preventions programs. Modelling, the use of induction and perspective-taking are often mentioned as parenting techniques that facilitate the development of cognitive empathy [ 85 , 86 ]. Though we have not measured empathy levels, our interviews provided unique insights into the way participants perceive and interpret the suffering of others, and the responses it elicits. Furthermore, the method offers a glimpse of how costs and benefits are calculated with respect to responding to the apparent victimisation of peers, as well as the awareness of others’ perspective and ability to anticipate their emotional states.

Online mediated contact with those suffering reduces involvement of the basic mechanisms of automatic, affective empathy [ 86 , 87 ]. This is due to the lack of direct contact with a universal stimulus (e.g., facial expressions, tone of voice, gestures), which would automatically trigger aversive arousal [ 88 ]. In addition, advanced mechanisms responsible for triggering reflective, cognitive empathy [ 86 , 89 ] are impeded. On the one hand, this is the product of the characteristics of digital devices that reinforce superficiality and impulsivity; while on the other hand, the problem lies in the developmental specifics of adolescence: deficits in inhibition, control, and self-distancing. Numerous results confirm the importance of empathy in reducing cyberbullying both as a personality disposition [ 18 ] and a situationally activated factor [ 14 , 35 ]. This needs to be addressed in the process of creating effective online bullying preventive measures.

A key role for effective prevention and problem-solving is teachers’ commitment to building and strengthening traditional (offline) relationships among young people and supporting their online engagement. As the findings show, students seek help from adults with whom they have a good relationship and who appreciate the importance of new media in the lives of young people. This positive image should not however be generalised to teachers as a group, as it pertains to individual adults, especially psychologists and school counsellors, who are trusted by young people. Such individuals typically undertake actions, often informal ones, on their initiative rather than act within a general scheme developed at the institutional level.

A crucial component emerging from our research is that solving issues related to cyberbullying needs to be implemented within the “understanding approach” of the teachers. There is a need in developing diagnostic competency in recognising potentially problematic situations (e.g., the importance of identifying high-risk groups as an element of systematic action against peer violence [ 90 ].

The most important conclusion that can be drawn from the analysis of the material collected in our research is that a significant number of measures undertaken by educators draw on many different approaches and models rather than on a systematic program of peer violence prevention and intervention. This clearly shows the need for a teacher approach shaped by an empathetic, personalised understanding of adolescents’ needs and motives. This approach also requires openness and a non-judgmental attitude towards young people and their problems, both offline and online. Nonetheless, our data shows the opposite. The typical approach of teachers may be characterised as rather distanced and based more on punitive strategies than real interpersonal contacts. This may negatively impact the students’ willingness to turn to teachers as helpers and mediators during cyberbullying incidents. This negative tendency may be even reinforced by unattractive didactics of many educational meetings concerning online risks as stated by our young respondents.

In terms of their universal characteristics, the interventions given as models in the literature tend to be multifaceted and interdisciplinary [ 74 , 91 ]. As such, they involve integration of interactions addressed to individuals (e.g., victims), the whole class, and/or the whole school community, incorporating both regular and occasional activities, proactive as well as reactive, i.e., initiated on an as-needed basis. The interdisciplinary approach is defined as involving experts from various disciplines (educators and psychologists, but also IT specialists, lawyers, police officers, etc.). The programs themselves should have strong foundations in theory, empirical findings, and knowledge of best practices, with systematic assessments of their outcomes [ 5 , 9 ]. This approach to cyberbullying prevention has proved to be particularly effective [ 80 ].

Another apparent shortcoming of preventive measures seems to be educators’ lack of ability to move from an abstract, often oversimplified level of description of the phenomenon to particular strategies acknowledging the experience of young people. Pupils express preference for an entirely different approach in prevention (e.g., more interactive, engaging forms, more taking into account the context of new media). It is also worth mentioning the need expressed by young people to use in educational activities the personal stories of individuals involved in cyberbullying. This kind of approach is likely to appear more worthwhile to target groups, since stories told by peers are more engaging than purely theoretical information. Moreover, such stories are also more memorable and comprehensible, as pointed out by Kreuter, et al. [ 92 ]. The fact that the online environment is not only the source of the problem but also a medium through which it can be solved was noted by Vandebosch [ 11 ]. This means that its engaging character is a clearly important distinguishing feature of the Internet as a means for preventive actions. Deliberate use of this quality seems to be important in terms of making productive use of the Internet in this context.

5. Conclusions

We have explored the key influencing conditions in order to show the complexity of the phenomenon of cyberbullying as well as its dependence on various contextual and relational factors. Implementing these results into effective prevention and intervention measures, in particular educational settings, is a challenge.

One of the fundamental aspects is to create a prevention strategy that would be more sensitive to the perspective of individuals who have important and unique knowledge. Unfortunately, the question of how young people perceive the source of cyberbullying, efficacy, and appropriateness of prevention and education efforts is rarely asked. Anti-bullying programs developed and/or implemented by their addressees based on participatory research are few and far between [ 34 , 93 , 94 , 95 ], with even fewer that take into account the perspective of not only adults, i.e., teachers, but also that of the adolescents themselves [ 29 , 93 , 95 , 96 ]. On the other hand, the importance of this approach finds support in this article’s reported data as well as empirical findings that show that ignoring the needs of adolescents or implementing inadequate interventions when dealing with peer relations that involve cyberbullying discourages students from seeking adults’ help, thereby limiting the range of effective forms of support available in these difficult circumstances [ 66 ]. This is precisely why asking what we can learn from the young victims, bystanders, and perpetrators of cyberbullying are so important. Opinions of the addressees of these actions (satisfaction, needs, perceived outcomes) should constitute the foundation for creating new and improving existing support programs, as was done in the research presented here.

The study is a source of both recommendations for future studies on cyberbullying prevention as well as for effective preventive measure creation.

The specific prevention strategies we recommend based on our results are as follows:

  • Cyberbullying is not a monolithic phenomenon but rather a collection of qualitatively different sub-phenomena that should be adequately addressed when developing preventive measures. This as our results shows may be caused by differences in technology use (methods) but also social aspects such as connection to traditional bullying or public versus private mode of hostile attacks.
  • Cyberbullying prevention should include online communication mediated in private and public channels as well as offline problems of young people, particularly those connected to traditional bullying.
  • Cyberbullying prevention should address all three roles present in cyberbullying cases: victims, perpetrators, and bystanders, as all actors influence the dynamics of particular cases. Bystanders have an especially powerful social influence in creating positive anti-bullying behavioural models.
  • Cyberbullying prevention measures should be adopted from the individualised perspectives of young people and teachers, since attitudes of young people in this respect closely relate to actual behaviour (e.g., providing support or indifference while witnessing cybervictimisation)
  • Cyberbullying prevention should emphasise the topics that are universal for the stage of adolescence: cautious online self-presentation as well displaying manifestations of the superficiality of judgment based on looks; the significance of the peer group and its consequences.
  • Cyberbullying prevention should focus on enhancing teenagers’ knowledge on the impact of computer-mediated communication on their behaviour in cyberbullying actions.
  • Cyberbullying prevention should focus on developing in adults an understanding of the importance of new media in the life and education of adolescents and on supporting teachers in online engagement. Another crucial element is to sustain and deepen traditional (offline) relationships with young people in the new media environment, underlining the role of teachers in modelling antibullying standards.

Thus, the results of the study provide both educational recommendations and suggestions for future studies on cyberbullying prevention. By using a qualitative approach, we were able to better capture the context and perspective of adolescents and teachers. This ensured a more comprehensive understanding of the complexities of violence perpetrated with the use of new technologies from the perspective of victims, perpetrators, and bystanders.

The study naturally has its flaws and limitations. The first limitation of the gathered data is its local context. The study was conducted only with (blinded for the review) pupils and teachers so its generalisability to other countries is limited. Yet, the issue of generalisation of our findings seems more complex. Although the achieved results are not representative in a statistical sense, the idea of their generalisation seems to be justifiable. Based on the rules of sample selection criteria in qualitative studies the sample meets the requirement of homogeneity (our respondents were precisely selected with regard to the education stage) and internal differentiation (selection of schools from various urban and rural settings, public and private schools, schools equipped with various Internet infrastructure as well as various socio-economic backgrounds). Specificity of qualitative research permits finding generalisations as long as the research is aimed at seeking qualitative knowledge, i.e., that concerning the motives and mechanisms of cyber-violence, as well as relations, for example, those between a witness’s experiences and offering help to victims, or configurations of, for example, competences regarding empathy and control and the phenomenon of cyber-violence. Thus, their significance lies in facilitating the recognition and understanding of the respondents’ natural environment. They also serve as a prerequisite for generating hypotheses concepts as well as application requests. The repetitiveness of observations in subsequent interviews is, most certainly, a pivotal factor [ 97 ].

Second, it seems overly optimistic to expect that the presented qualitative material will provide a definite response as to what kind of preventive measures ought to be taken. Likewise, no clear-cut methods of compensating the deficit of competences conducive to violent behaviours can be inferred. Our interlocutors told us about their feelings, experiences, and behaviours, but it lies with the researcher, who also takes into account other data from this domain, to decide how the gathered material could be used to develop a preventive strategy.

Third, due to the complexity of the attitudes and behaviours of young people, as well as the experiences and events described by them, one ought to remain cautious about the provided straightforward responses. For example, the attractiveness of the Internet should not fully determine one’s decision to use it as an exclusive tool in education programs with the form of a lecture, considered as “dull”, being eliminated. There are advantages and deficits to both forms. For example, online conditions increase superficiality and rashness [ 41 , 42 ], whereas an interesting lecture may engage reflexivity. Everything depends on the adequateness and attraction of the content of the message—the choice of the medium seems much less important.

Fourth, our study is situated within a qualitative paradigm. Thus, we do not have the data that allows us to provide credible comparisons between different subgroups (e.g., boys and girls). This shortage is also connected to our sampling that is not representative for such comparisons. Nonetheless, our findings may be implemented in further quantitative research, particularly for defining variables and categories and constructing research tools.

Finally, the limitation of semi-structured interviews is the use by participants of subjective criteria to evaluate what they identify as the root cause of the phenomenon. Thus, it sometimes happens that they do not distinguish between the causes and symptoms of a phenomenon. Nevertheless, such material offers an opportunity to identify the subjective perspective of people directly involved in a given phenomenon.

Funding Statement

This research was funded by Narodowe Centrum Badań i Rozwoju PL (The National Centre for Research and Development). Grant number: /IS-2/31/NCBiR/2015 https://www.gov.pl/web/ncbr-en (accessed on 10 July 2022). Grant recipient: Praesterno Foundation https://www.praesterno.pl/programy-biezace/cyberprzemoc/ (accessed on 10 July 2022). The funder had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

Author Contributions

Conceptualization, J.P., P.P., A.S. and J.B.; Data curation, J.P., P.P., A.S. and J.B.; Formal analysis, J.P., P.P., A.S. and J.B.; Investigation, J.P., P.P., A.S. and J.B.; Methodology, J.P., P.P., A.S. and J.B.; Validation, J.P., P.P., A.S. and J.B.; Writing—original draft, J.P., P.P., A.S. and J.B.; Writing—review & editing, J.P., P.P., A.S. and J.B. All authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Ethical Committee of Faculty of Psychology of the University of Warsaw, Poland. The ethical procedure of the study included also the following elements: Written parental/guardian consent in the case of students, voluntary participation and the opportunity to withdraw from the survey at any stage, saving and publishing research material in a way that protects the anonymity of respondents and leaving the choice of method of documentation to the respondents (audio recording or written record).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Conflicts of interest.

The authors declare no conflict of interest.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

IMAGES

  1. (PDF) A Systematic Review on Cyberbullying Interventions and

    write a literature review about cyberbullying brainly

  2. Fillable Online Cyberbullying: A Review of the Literature Fax Email

    write a literature review about cyberbullying brainly

  3. (PDF) Cyberbullying: A Systematic Literature Review to Identify the

    write a literature review about cyberbullying brainly

  4. (PDF) Cyberbullying: A Systematic Literature Review to Identify the

    write a literature review about cyberbullying brainly

  5. Position Paper Sample About Cyber Bullying

    write a literature review about cyberbullying brainly

  6. Essay Tungkol Sa Cyberbullying

    write a literature review about cyberbullying brainly

VIDEO

  1. How to write literature review perfectly

  2. How to write literature review in research

  3. Безопасное поведение в интернете: как ученикам защититься от кибербуллинга

  4. Expanding perspectives on cyberbullying

  5. how to write literature review using chat gpt

  6. How to write Literature Review in an Academic Research

COMMENTS

  1. PDF Cyberbullying: A Review of the Literature

    A review of literature is provided and results and analysis of the survey are discussed as well as recommendations for future research. Erdur-Baker's (2010) study revealed that 32% of the students were victims of both cyberbullying and traditional bullying, while 26% of the students bullied others in both cyberspace and physical environments ...

  2. (PDF) Cyberbullying: A Review of the Literature

    PDF | On Jan 1, 2021, Saurav Chakraborty and others published Cyberbullying: A Review of the Literature | Find, read and cite all the research you need on ResearchGate

  3. Cyberbullying Among Adolescents and Children: A Comprehensive Review of

    However, our systematic review summarized global children and adolescents cyberbullying in the last 5 years and revealed an average cyberbullying perpetration rate of 25.03%, ranging from 6.0 to 46.3%, while the average victimization was 33.08%, ranging from 13.99 to 57.5%.

  4. (PDF) Cyberbullying: A Literature Review

    Cyberbullying 10. cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, using the Internet, interactive and digital technologies or mobile phones. It has to. full ...

  5. Cyberbullying: A Narrative Review : Journal of Mental Health and Human

    al domain of offline to online and is understood as cyberbullying. Aim: This review aims to assess the concept, types of cyberbullying, prevalence, risk and protective factors, conceptual models explaining cyberbullying, psychological impact, and preventive strategies for cyberbullying. Methodology: Internet sources (PubMed and Google Scholar) were searched for the available literature, and a ...

  6. Family and Educational Strategies for Cyberbullying Prevention: A

    2. Materials and Methods. This review was performed in adherence with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines [].A systematic literature review regarding strategies or interventions adopted to address the cyberbullying phenomenon was conducted using a public electronic database (PubMed) using the following query strings separately ...

  7. Cyberbullying on social networking sites: A literature review and

    Abstract and Figures. Cyberbullying on social networking sites is an emerging societal issue that has drawn significant scholarly attention. The purpose of this study is to consolidate the ...

  8. Cyberbullying in adolescents: a literature review

    Cyberbullying is a universal public health concern that affects adolescents. The growing usage of electronic gadgets and the Internet has been connected to a rise in cyberbullying. The increasing use of the Internet, along with the negative outcomes of cyberbullying on adolescents, has required the study of cyberbullying. In this paper author reviews existing literature on cyberbullying among ...

  9. Cyberbullying: A Systematic Literature Review to Identify the Factors

    With the increased access to the internet, technology and social media, the problem of cyberbullying has been on the rise. Since the higher education necessitates access to information technology, university students are found comparatively more exposed and involved in the incidences of cyberbullying. Prior research has heavily focused on school students and has mostly ignored university ...

  10. Cyberbullying in adolescents: a literature review

    Abstract. Cyberbullying is a universal public health concern that affects adolescents. The growing usage of electronic gadgets and the Internet has been connected to a rise in cyberbullying. The increasing use of the Internet, along with the negative outcomes of cyberbullying on adolescents, has required the study of cyberbullying.

  11. Cyberbullying : a literature review

    Cyberbullying : a literature review . Abstract . Technology is becoming more prevalent each day, with that a new form of bullying is happening. The new form is cyberbullying. It is form of bullying that takes place over cell phones, email, websites, and chat rooms. While cyberbullying is a form of bullying, there are differences between ...

  12. Cyberbullying on social networking sites: A literature review and

    1. Introduction. Cyberbullying is an emerging societal issue in the digital era [1, 2].The Cyberbullying Research Centre [3] conducted a nationwide survey of 5700 adolescents in the US and found that 33.8 % of the respondents had been cyberbullied and 11.5 % had cyberbullied others.While cyberbullying occurs in different online channels and platforms, social networking sites (SNSs) are fertile ...

  13. Cyberbullying and Adolescents

    Purpose of Review. Cyberbullying is an aggressive behavior involving a type of electronic communication intending to harm a victim that can have profound effects on adolescents. This review examines the epidemiology, issues from cyberbullying, presentation to care of its victims and proposed interventions to this behavior.

  14. How to Write a Literature Review

    Examples of literature reviews. Step 1 - Search for relevant literature. Step 2 - Evaluate and select sources. Step 3 - Identify themes, debates, and gaps. Step 4 - Outline your literature review's structure. Step 5 - Write your literature review.

  15. Cyberbullying and its influence on academic, social, and emotional

    1. Introduction. Cyberbullying is defined as the electronic posting of mean-spirited messages about a person (such as a student) often done anonymously (Merriam-Webster, 2017).Most of the investigations of cyberbullying have been conducted with students in elementary, middle and high school who were between 9 and 18 years old.

  16. Cyberbullying: A literature review of its relationship to adolescent

    The focus of this literature review examines interventions for 12-18-year-old adolescents experiencing depressive symptoms as a consequence of cyberbullying. Findings reveal a positive correlation between cyberbullying and depressive symptomology, but only a few interventions treat this problem.

  17. Cyberbullying in the world of teenagers and social media: A literature

    Cyberbullying amongst teenagers is a major issue, due to their increased use of social media. Previous literature surveys have not covered in detail cyberbullying studies in 2014 and cyberbullying risk factors. This literature review explores cyberbullying research areas, such as the use of social media by teenagers, themes from cyberbullying studies carried out since 2012, cyberbullying risk ...

  18. A systematic literature review on the effects of bullying at school

    Abstract. Bullying is a severe problem that is experienced, especially in schools. Children belong to the same social group, but some feel powerful than others and therefore take advantage of them ...

  19. A Review on Deep-Learning-Based Cyberbullying Detection

    Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying detection is a pressing need in today's world, as the prevalence of cyberbullying is continually growing, resulting in mental health issues ...

  20. PDF Cyberbullying by Partial Fulfillment of the Approved: 2 Semester Credits

    Chapter II: Literature Review Foreword This chapter includes a discussion of the prevalence and seriousness of cyberbullying, followed by the different forms of cyberbullying. In addition, the chapter will include the differences between males and females when it comes to cyberbullying and a review of the Dawn-Marie Wesley case ofbullycide.

  21. Cyberbullying Characteristics and Prevention—What Can We Learn from

    1.1. Key Knowledge Gaps in the Research on the Effectiveness of Anti-Cyberbullying Programs Addressed to Adolescents. The effectiveness of anti-cyberbullying programs has not been sufficiently assessed [10,11,12], with few studies demonstrating convincingly which methods are effective and for whom specifically.Additionally, little is known about the critical components of such programs that ...

  22. Model Programs Guide Literature Review: Bullying and Cyberbullying

    Based on a literature review, this web resource first distinguishes bullying from other types of aggression or violence and then presents sections on the following bullying-related topics: 1) scope of the problem; 2) theoretical foundation; 3) risk and protective factors; 4) consequences of bullying; 5) moderators and interactive protective factors; 6) bystanders; and outcome evidence for anti ...

  23. Submit your 300-word article review on a recent cyber bullying

    Here are five key points that you should consider when writing your article review: 1. The Definition of Cyberbullying: Define what cyberbullying is and its different types, including direct and indirect cyberbullying. You can also provide examples of how cyberbullying can affect the victim. 2.