Journal Article
Research Support, N.I.H., Extramural
Research Support, Non-U.S. Gov't
Add like
Add dislike
Add to saved papers

Longitudinal predictors of cyber and traditional bullying perpetration in Australian secondary school students.

PURPOSE: Cyberbullying perpetration (using communication technology to engage in bullying) is a recent phenomenon that has generated much concern. There are few prospective longitudinal studies of cyberbullying. The current article examines the individual, peer, family, and school risk factors for both cyber and traditional bullying (the latter is bullying that does not use technology) in adolescents.

METHODS: This article draws on a rich data set from the International Youth Development Study, a longitudinal study of students in Victoria, Australia and Washington State, United States, which began in 2002. In this article, data from almost 700 Victorian students recruited in grade 5 are analyzed to examine grade 7 (aged 12-13 years) predictors of traditional and cyberbullying perpetration in grade 9 (aged 14-15 years).

RESULTS: Fifteen per cent of students engaged in cyberbullying, 21% in traditional bullying, and 7% in both. There are similarities and important differences in the predictors of cyber and traditional bullying. In the fully adjusted model, only prior engagement in relational aggression (a covert form of bullying, such as spreading rumors about another student) predicted cyberbullying perpetration. For traditional bullying, previous relational aggression was also predictive, as was having been a victim and perpetrator of traditional bullying, family conflict, and academic failure.

CONCLUSIONS: The use of evidence-based bullying prevention programs is supported to reduce experiences of all forms of bullying perpetration (cyber, traditional, and relational aggression). In addition, for traditional bullying perpetration, addressing family conflict and student academic support are also important.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

Related Resources

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app