Add like
Add dislike
Add to saved papers

Vulnerability and Mimicry as Predictive Axes in Cyberbullying.

The co-occurrence of bullying and cyberbullying in a dual society like the present calls for specific measures of intervention to be able to forestall the emergence of new problems and slow the increase and diversification of violent behavior. This study's objective was to determine whether the gender of those involved as well as the forms of aggression experienced both in presential and virtual scenarios are predictive indicators of the violent behavior of aggressive-victims. The participant sample was 1,648 adolescents aged 12 to 16 years (48.9% girls). The instrument used was a questionnaire. The results show the existence of four categories of aggressive-victims resulting from the co-occurrence of presential and cyber contexts: aggressive-victims of bullying, cyberaggressive-victims, aggressive-cybervictims, and cyberaggressive-cybervictims. Furthermore, three predictive indicators of the abusive behavior of the aggressive-victims in their different categories were identified: continuity between contexts, type of abuse suffered, and the gender of those involved. These indicators allow one to extract individual profiles of the different types of aggressive-victims, which facilitate, on one hand, the understanding of the processes of victimization and aggression that adolescents experience in both presential and cyber contexts, and, on the other, the design of programs and specific actions based on the characteristics of the adolescents and their previous experiences of victimization or cybervictimization.

Full text links

We have located links that may give you full text access.
Can't access the paper?
Try logging in through your university/institutional subscription. For a smoother one-click institutional access experience, please use our mobile app.

For the best experience, use the Read mobile app

Mobile app image

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app

All material on this website is protected by copyright, Copyright © 1994-2024 by WebMD LLC.
This website also contains material copyrighted by 3rd parties.

By using this service, you agree to our terms of use and privacy policy.

Your Privacy Choices Toggle icon

You can now claim free CME credits for this literature searchClaim now

Get seemless 1-tap access through your institution/university

For the best experience, use the Read mobile app