Next Article in Journal
Academic Acculturation of International Doctoral Students in the U.S.: A Qualitative Inquiry
Next Article in Special Issue
The Relationship of Internet Gaming Addiction and Suicidal Ideation among Adolescents: The Mediating Role of Negative Emotion and the Moderating Role of Hope
Previous Article in Journal
Should I Help? Prosocial Behaviour during the COVID-19 Pandemic
Previous Article in Special Issue
Current Status and Correlation of Physical Activity and Tendency to Problematic Mobile Phone Use in College Students
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

How Are Bystanders Involved in Cyberbullying? A Latent Class Analysis of the Cyberbystander and Their Characteristics in Different Intervention Stages

School of Psychology, Inner Mongolia Normal University, Hohhot 010000, China
*
Author to whom correspondence should be addressed.
Int. J. Environ. Res. Public Health 2022, 19(23), 16083; https://doi.org/10.3390/ijerph192316083
Submission received: 9 November 2022 / Revised: 28 November 2022 / Accepted: 29 November 2022 / Published: 1 December 2022

Abstract

:
Background: Cyberbullying is a phenomenon that occurs by means of digital devices in virtual environments. Although research reveals the relevant role played by bystanders in stopping cyberbullying, the patterns of cyberbullying bystanders among Chinese college students is not clear. Data: Participants were 1025 Chinese college students (62.0% girls, 38.0% boys). The present analyses empirically explored the roles of cyberbystanders (passive outsider online, defender of the cybervictim online, reinforcer of the cyberbully online, passive face-to-face outsider, face-to-face defender of the cybervictim, and face-to-face reinforcer of the cyberbully) using latent class analysis. Results: (1) Five latent classes were identified: defensive bystander (17.9%), indifferent bystander (10.1%), low-involved bystander (10.2%), medium-involved bystander (45.7%), and high-involved bystander (16.0%). (2) The cyberbystander patterns varied significantly for all stages of bullying intervention, among which the defensive bystander had the lowest score in the notice stage but the highest scores in the other stages. (3) There was a graded relationship between the five latent classes and the level of social network site use and cyber-victimization experience. College students with high usage of social network sites and high cyber-victimization experience were more likely to engage in diverse bystander behaviors.

1. Introduction

Bystanders of cyberbullying refers to “individuals who witness cyberbullying”, and these bystanders can be divided into three types, according to their behavioral responses after witnessing cyberbullying: defender, reinforcer, and outsider [1]. The defender plays a vital role in protecting others from cyberbullying, and the bystander shelter behavior can quickly and effectively curb a bully’s behavior and alleviate harm to those being bullied [2], which impacts psychological factors, such as moral cognition, high empathy, and self-efficacy [3,4]. In contrast, by giving the bully positive feedback (e.g., encouragement or laughter), the reinforcer strengthens the bully’s aggressive behavior against the victim, enlarging the situation and causing secondary damage [5]. Outsiders refer to cyberbystanders who stand on the sidelines when someone is being bullied, or who focus only on protecting themselves. Studies have shown that 59 to 70% of college students have witnessed cyberbullying on social media. However, few people will react positively or negatively to it; most people choose to remain an outsider and allow the cyberbullying to continue [6,7]. In addition to the above three common behavioral responses, Sarmiento et al. [8] further considered the environmental factors, believing that bystanders would exist in face-to-face interactions (such as talking to or sitting with people involved in cyberbullying beside him) and completely online (such as interacting on social networking sites). That is divided into six types passive outsider online, defender of the cybervictim online, reinforcer of the cyberbully online, passive face-to-face outsider, face-to-face defender of the cybervictim, and face-to-face reinforcer of the cyberbully. Considering the large number of bystanders to cyberbullying and the impact of their various behaviors on forming healthy social environments, it is important to further explore the patterns cyberbullying bystanders in the context of college students. The analysis of the bystander model of cyberbullying has been divided into three parts: latent class analysis, intervention stage characteristics, and behavior-influencing factors.

1.1. Latent Classes of Bystanders in Cyberbullying

There are significant differences in the behavioral responses of the different types of cyberbystanders, however previous studies have focused primarily on the diversity of the bystanders’ roles, and analyzed from the single perspective of the defender, reinforcer, or outsider [9]. However, this framing makes it difficult to explore the internal heterogeneity of the cyberbystander population and examine the cross-population. In the case of cyberbullying, the same bystander may play different roles simultaneously, such as someone assisting in cyberbullying (i.e., the reinforcer) and also acting as a witness to the cyberbullying (i.e., the outsider) [10]. Is there then an intersection between the complex and diverse roles of cyberbystanders? What kind of behavioral commonalities might this cross-group have? A latent class analysis (LPA) can potentially help us answer these questions.
A LPA is an individual-centered statistical method that can explain the correlation between explicit continuous variables through potential continuous variables, fully using all of the sample data to estimate the possibility of which group all individuals belong to. The basic assumption is that the probability distribution of various responses of explicit variables can be explained by a small number of mutually exclusive potential category variables, and the choice of explicit variables in each category has a specific tendency [11]. A LPA can make up for the disadvantages of variable-based measurements, allowing the exploration of in-group classifications and helping us understand which individuals show unique behavior patterns, in order to provide more targeted interventions for the various subgroups and improve the number of protections. Furthermore, it can also effectively integrate different information, compare subgroups more intuitively and comprehensively, and explore cross-group characteristics. Therefore, the current study used a potential profile analysis to explore the heterogeneity of cyberbullying bystanders in both network and face-to-face situations.

1.2. Intervention Characteristics of Cyberbystanders

Bystanders are essential to cyberbullying events [12]. Their intervention can alleviate or aggravate the victim’s bullying dilemma [13]. However, little is known about when and why bystanders intervene. The bystander intervention model (BIM) can help us explain the conditions under which people choose to help or not help people being bullied [14]. Five stages have been identified as the steps that must take place for a bystander to intervene. Specifically, one must (a) notice the event, (b) interpret the event as an emergency that requires help, (c) accept responsibility for intervening, (d) know how to intervene or provide help, and (e) implement intervention decisions. Studies have found that 68 percent of people notice when cyberbullying occurs, but only 10 percent directly intervene [15], meaning that there are many missing links interrupting the action from the cyberbystander. So, where is the point where the steps are disrupted, preventing the bystander from becoming an active protector? This study used these five aforementioned stages of bullying intervention (i.e., notice, emergency, responsibility, know, act) to investigate the behavioral response characteristics of the different types of cyberbystanders in these stages. Furthermore, the study aimed to uncover the hindering stages in the process of bullying intervention.

1.3. Influencing Factors of Cyberbystanders

According to the ecological systems theory, individuals are embedded in a series of environmental systems that influence one another. The micro-system is closely related to individual behavior [16]. To further clarify the predictive factors leading to the formation of the subcategory of cyberbystanders, the current study aimed to explore cyberbystanders from two aspects: individuals in the micro-system (perceived anonymity and cyber-victimization experience) and environment (social network use). First, the study chose perceived anonymity as the predictor of different bystander subcategories, starting from individual factors. Perceived anonymity refers to one’s belief in their ability to maintain an unrecognizable status in a specific digital environment [17]. Due to the online disinhibition effect, perceived anonymity can reduce the cost and adverse consequences of online behavior, leading individuals to engage in more unconstrained online behavior. For example, Lapidot-Lefler and Barak [18] found that anonymous participants were more likely to use threatening language in online debates than those who were not anonymous. Therefore, we can reasonably assume that the higher one’s perceived anonymity, the more likely one is to engage in involved bystander behavior (protective or reinforcement behavior). Second, the cyber-victimization experience is another significant individual predictor. Studies have found that cyber-victimization may simultaneously lead to both more helpful and hurtful behaviors. For example, Barlinska et al. [19] found that being bullied in an online environment is a factor that increases the negative behavior of bystanders. Meanwhile, DeSmet et al. [20] suggested that those who had previously been victims of cyberbullying showed a stronger intention to help other victims. As a result, the cyber-victimization experience can affect the potential bystander category, both online or face-to-face. Finally, social networking site use is an environmental factor that affects the behavior of cyberbystanders. Routine activity theory suggests that the digital monitoring ability and online lifestyle of individuals—such as frequent click on online icons without precaution—increases their likelihood of becoming victims of cyberbullying [21]. Therefore, based on prior research and ecological systems theory, we explored the predictive effects of perceived anonymity, cyber-victimization experience, and social network site use on the subcategories of college students cyberbystanders.
To examine the data, we used latent class analysis to explore the cyberbystander patterns of college students, focusing on the intervention characteristics and influencing factors of different model subgroups. The current study proposed the following hypotheses: (1) potential subgroups of cyberbystanders can be observed; (2) there are differences in the performance of different potential categories of bystanders in different stages of cyber-bystander intervention; and (3) subgroups of cyberbystanders are associated with perceived anonymity, cyber-victimization experience, and social network site use.

2. Materials and Methods

2.1. Participants and Procedure

A total of 1025 college students were selected using a random cluster sampling from four Chinese cities, which were Shandong Province, Henan Province, Fujian Province and Inner Mongolia Autonomous Region (male = 389; female = 636). The participants were representative of the overall sample in terms of age, gender, grade, and place of origin (i.e., whether the participants came from rural or urban areas). The participants ranged from 17 to 23 years of age (Mage = 20.05, SD = 1.23); were in their first to fourth year of study, with a breakdown of 202 (19.7%), 339 (33.1%), 287 (28.0%), and 197 (18.2%); and included 318 students (31.0%) in rural areas, 707 (69.0%) students in urban areas, respectively. The study obtained the informed consent of all participants, as well as the approval of the local ethics committee before commencing.

2.2. Measures

Cyberbullying bystander scale (CBS). The 40-item scale was used to evaluate different groups of bystanders in cyberbullying [8]. The instrument is based on the idea that all cyberbullying bystanders could exist in two situations: face-to-face interactions (e.g., talking to or sitting next to a person involved in cyberbullying) and online (e.g., interacting on a social networking site). As such, the CBS is divided into six dimensional structures: passive outsider online, defender of the cybervictim online, reinforcer of the cyberbully online, passive face-to-face outsider, face-to-face defender of the cybervictim, and face-to-face reinforcer of the cyberbully. Participants rate their responses on a 5-point Likert scale ranging from 1 (never) to 5 (very frequently). Cronbach’s α for the scale in the current study was 0.92.
Bystander intervention in bullying scale (BIBS) [22]. The 16-item scale consists of five dimensions (i.e., notice, emergency, responsibility, know and act), which measure the corresponding stages of the bystander intervention model. Higher scores represent a higher degree of the bystander’s awareness and behavior of interfering with bullying. Participants rate their responses using a 5-point Likert scale ranging from 1 (strongly disagree) to 5 (strongly agree). Cronbach’s α for the scale in the current study was 0.83.
Anonymity and strength differential scale (ASDS) [23]. The 10-item ASDS consists of two dimensions that describe one’s agreement with Anonymity and Strength attitudes. The Anonymity subscale comprises five items (e.g., “I feel comfortable sending mean text messages or e-mails to anybody regardless of whether I know them or not.”), all of which are rated on a 5-point scale ranging from 1 (strongly disagree) to 5 (strongly agree). Higher scores represent a higher degree of perceived anonymity. Cronbach’s α for the scale in the current study was 0.88.
Social network site intensity scale (SNSI) [24]. The 8-item SNSI consists of two dimensions that measure the extent to which the participant is actively engaged in social networking site activities (e.g., “Social networking sites are part of my everyday activities.”). Higher scores represent a higher frequency of use intensity of social networking sites. Cronbach’s α for the scale in the current study was 0.78.
Cyberbullying inventory (CBI) [25]. The 18-item CBI consists of one dimension that describes one’s frequency of cyber-victimization (e.g., “I’ve been hurt by people I know online”). Higher scores represent a higher frequency of experiencing cyber-victimization. Participants rate their responses using a 4-point Likert scale ranging from 1 (have never encountered) to 4 (encountered more than five times). Cronbach’s α for the scale in the current study was 0.96.

2.3. Data Analysis

First, we screened and calculated the descriptive statistics for all measurements. Second, to test for the existence of the discrete groups (classes) with similar psychometric profiles, we conducted a LCA using the dichotomous items of the CBS. Then, on this basis, we analyze the intervention characteristics of different cyberbystanders in the above stages (MANCOVA). Finally, multivariate logistic regression models were used to examine the associations of the CBS and perceived anonymity, cyber-victimization experience, and intensity of social network sites.

3. Results

3.1. Identification and Delimitation of the Latent Classes of Cyberbullying Bystanders

In this study, using the LCA of the 40 items of the CBS, six potential category models were established, and their fitting indexes were compared and selected for classification. Table 1 shows the fit indices resulting from the different estimated LC models. With the increase in the number of categories, the values of AIC, BIC, and aBIC continued to decrease. The entropy classification index was close to 1, indicating that the model gradually improved. The six-class model did not replicate the best log likelihood values and the LMR was not statistically significant (p > 0.05), so it was therefore not considered further. The five-class model was the best fitting solution, when compared to the one-, two-, three-, and four-class models. The five-class model presented a statistically significant LMR p-value and the lowest AIC and BIC values.
Membership for the five-class solution was as follows (see Figure 1). Latent class 1 (LC1, n = 183, 17.9%) includes individuals with high scores on item 6 to 11 (defender of the cybervictim online) and items 24 to 32 (face-to-face defender of the cybervictim) and was labelled “defensive bystander”. Latent class 2 (LC2, n = 103, 10.1%) consisted of individuals with high scores on items 1 to 5 (passive outsider online), medium scores on items 6 to 11 (defender of the cybervictim online) and items 19 to 32 (passive face-to-face outsider, face-to-face defender of the cybervictim). Considering the obvious passive bystander characteristics of class 2, we called it “indifferent bystander”. Lastly, Latent Class 3 (LC3, n = 104, 10.2%), Latent Class 4 (LC4, n = 468, 45.7%), and Latent Class 5 (LC5, n = 164, 16.0%) consisted primarily of individuals with balanced scores on the CBS items and, thus, were called “low-involved bystander”, “medium-involved bystander”, and “high-involved bystander”, respectively.

3.2. Characteristics of the Cyberbullying Bystanders in Different Stages of the Bullying Intervention

A MANCOVA revealed that the cyberbystander patterns varied significantly for all stages of a bullying intervention. Table 2 shows the mean scores, standard deviations, and effect sizes resulting from the analyses. A clear differentiation was found that showed that defensive bystanders had the lowest score in the notice stage, but the highest score in all other stages. High-involved bystanders scored higher in all five stages.

3.3. Multiple Logistic Regression Analysis

A multinomial logistic regression was used to assess the association between the influencing factors and the latent class of the CBS. For details, influencing factors included anonymity, SNS intensity, cyber-victimization experience, and participants’ sociodemographic variables, such as gender (female vs. male), grade (1th–4th grade), and left-behind pattern (categories: “not left-behind”, “father migrant”, “mother migrant”, and “two-parent-migrant”).
Table 3 indicated that, compared to the low-involved bystander class, one group was seen to be positively related to the SNS intensity, with OR (95% CI) of 1.91 (1.22~2.97) for the high-involved bystander class (p < 0.05). Similarly, two groups were seen to be positively related to the cyber-victimization experience, with OR (95% CI) of 3.52 (2.16~5.74) and 3.99 (2.33~6.84) for the medium- and high-involved bystander classes (p < 0.01).

4. Discussion

4.1. Co-Occurrence and Heterogeneity of the Cyberbullying Bystander Subcategory

First, the results of the LCA showed that there were five potential patterns of cyberbullying bystanders among college students: defensive bystander (17.9%), indifferent bystander (10.1%), low-involved bystander (10.2%), medium-involved bystander (45.7%), and high-involved bystanders (16.0%). Overall, there were significant differences in the scores and trends of the different roles of cyberbullying bystanders, indicating the heterogeneity in this group. Among the five classes, there were four bystander groups with a high involvement, with the low-involved bystander class being the exception. The total proportion of the four groups was 89.8%, which shows that cyberbullying bystanders are common among college students in China.
Second, the score of each cyberbullying bystander subcategory also had a multi-role co-occurrence. That is to say that individuals who demonstrate a certain kind of bystander behavior will simultaneously exhibit other forms of bystander behavior as well. For example, the trends of six bystander behaviors for medium- and high-involved bystanders are similar, and the level of each is relatively consistent. In addition to the three equilibrium-involved classes of bystanders, this study found two unique classes of defensive and indifferent bystanders with unique co-occurrence phenomena. Among them, the defensive bystanders scored higher in the two types of online and face-to-face defense behaviors, while outsiders and reinforcers scored lower. The results showed that college students in this category tend to stop and interfere when noticing cyberbullying, whether communicating with the bullies face-to-face or online. Indifferent bystanders scored higher in the passive outsider online category, and medium in terms of online and face-to-face defender categories. The results indicated that this category of college students responds less to events in the face of cyberbullying. The network environment further reduces their intervention intention, making their inaction more prominent online.

4.2. Intervention Characteristics of the Cyberbystanders

The analysis of variance showed significant differences in the five stages of bystander intervention among college students in the different subcategories of the cyberbullying bystander. For defensive bystanders, among the five stages of bullying intervention, the score of the notice stage was significantly lower than that of other groups. However, the scores for the other four stages of emergency, responsibility, know, and act were higher. It means that although defensive bystanders may not be acutely aware of cyberbullying, it is easy for them to enact positive and protective interventions once they discover it happening. For high-involved bystanders, bullying intervention scored higher in all five stages, which was also the highest scoring overall with the exception of defensive bystanders. This shows that high-involved bystanders are drawn quickly into cyberbullying. Whether it is a positive or negative behavior, they will participate in it in their own way and may become affected by the emotions or atmosphere. In addition, the reason that prevents low-involved bystanders and indifferent bystanders from making positive interventions may be the group members’ low sense of responsibility and intervention ability. For them, even if they have noticed the occurrence of the incident, the scattered responsibilities in the cyber incident and the huge onlookers may reduce their intention to intervene in the cyberbullying incident. Meanwhile, the low intervention behaviors of the largest number of the low-involved bystanders (45.7%) are more likely, due to their negative interpretation of events, which aligns with the findings of existing studies. For example, one study found that most participants believe that being bullied is the fault of the victim, and that bystanders believing the victim is responsible for their plight will significantly reduce the chances that the bystanders will provide social support to the victim [26,27].

4.3. Influencing Factors of Cyberbystanders

The results showed that the experience of cyber-victimization and the intensity of social networking sites could predict the cyberbullying bystanders category group to which some college students belong. Specifically, the more experience one has of cyber-victimization, the more likely they will be a medium- or high-involved bystander, that is, the experience of cyber-victimization will affect the bystanders’ degree of involvement of cyberbullying. This result was in line with the social reconnection hypothesis which states that when individuals experience damage to social ties, they will often try to repair it through subsidiary behavior [28]. People will obey authority [29] and even spend money to regain social connections [30], which shows the power of the motivation to reintegrate into society [31]. Therefore, whether it is active protection or malicious enhanced bullying, individuals may increase their connections with the group in various ways in order to reintegrate themselves. Meanwhile, the higher the intensity of one’s use of social networking sites, the more likely they will become a high-involved bystander. This is in line with the daily activity theory of the Internet, which suggests that the higher the intensity of one’s use of social networking sites, the more likely they are to witness cyberbullying.
Furthermore, the analysis of the different models’ demographic characteristics showed differences between the demographic variables, such as gender and left-behind model. For gender, there is no gender difference in the defensive bystanders, which is consistent with previous studies [32]. However, on the whole, in comparison to girls, boys are more likely to be involved as cyberbystanders, and this involvement includes both indifference and positive intervention. The results support the role continuity theory that boys are more likely to show role overlap than girls in cyberbullying. As a result, it may be because boys’ awareness of the seriousness of cyberbullying is significantly lower than that of girls, so they are more likely to participate in the event in the form of “joyous”. In addition, boys who prefer highly active online activities, such as online games, are more likely to be involved in cyberbullying than girls [33]. Regarding the left-behind patterns, compared with those not left-behind, it appears to be easier to predict the involvement of bystanders who were left behind by their mother alone or by both parents, than those who were left behind by their father alone. In other words, those with a migrant father were less likely to be indifferent and medium-involved bystanders. At the same time, a migrant mother predicted defensive and high-involved bystanders, which may be related to the parents’ roles in the student’s life to this point. According to the object relation theory, when object relevance between an individual and their father or mother is destroyed, and external situations force the child to be separated from their father, mother, or both parents, this may induce the individual to demonstrate more degenerative bad behavior [34].

5. Limitation

There are still some limitations in this study, which need to be valued and improved. On the one hand, although the sample selected was statistically representative, it was only from four cities in China. Future research should include individuals from different Chinese regions. On the other hand, due to the features of the cross-sectional data, it is difficult to explain the causal relationship between variables and observe the cyberbullying bystanders’ dynamic changes in the time domain. Future studies can further explain the causality and strengthen the horizontal and vertical comparative studies of potential profiles to understand better this group’s characteristics and behavior patterns, that is, how one profile is transformed into another and what factors led to this transformation.

6. Conclusions

Overall, this study provides additional evidence for the heterogeneity of college students’ cyberbullying bystander behavior in the context of China. In this study, through the investigation of face-to-face and online CBS, we found five CBS subgroups related to the intensity of social networking site use and the experience of cyber-victimization, and the degree strength of correlation was different. Therefore, the results suggest that when formulating intervention plans to improve the behavior of active cyberbystanders, we should focus on a different CBS for a targeted intervention.

Author Contributions

Y.J., T.J. and L.Z. contributed to the experiment design, investigation analysis of the data, and drafted the manuscript. Y.W. helped to perform the revision of the manuscript, and provided final approval for the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Natural Science Foundation of Inner Mongolia, China (Grant No. 2021MS03061); National Social Science Foundation of China (Grant No. 22XSH002); Fundamental Research Funds for the Inner Mongolia Normal University, China (Grant No. 2022JBQN112).

Institutional Review Board Statement

The study was conducted in accordance with the Declaration of Helsinki, and approved by the Ethics Committee of School of Psychology, Inner Mongolia Normal University (Study code: 2022082301).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Due to privacy issues, the data may not be shared publicly.

Conflicts of Interest

The authors have declared that there are no conflict of interest in relation to this study.

References

  1. Huang, X.J.; Chu, X.W.; Liu, Q.Q.; Zhou, Z.K.; Fan, C.Y. Bystander behavior in cyberbullying. Adv. Psychol. Sci. 2019, 27, 1248–1257. [Google Scholar] [CrossRef] [Green Version]
  2. Lambe, L.J.; Cioppa, V.D.; Hong, I.K.; Craig, W.M. Standing up to bullying: A social ecological review of peer defending in offline and online contexts. Aggress. Violent Behav. 2019, 45, 51–74. [Google Scholar] [CrossRef]
  3. Dorit, O.-S.; Tali, H.; Sigal, E. Bystanders’ behavior in cyberbullying episodes: Active and passive patterns in the context of personal-socio-emotional factors. J. Interpers. Violence 2017, 32, 23–48. [Google Scholar]
  4. Zych, I.; Farrington, D.P.; Ttofi, M.M. Protective factors against bullying and cyberbullying: A systematic review of meta-analyses. Aggress. Violent Behav. 2019, 45, 4–19. [Google Scholar] [CrossRef]
  5. Quirk, R.; Campbell, M. On standby? A comparison of online and offline witnesses to bullying and their bystander behaviour. Educ. Psychol. 2015, 35, 430–448. [Google Scholar] [CrossRef] [Green Version]
  6. Gahagan, K.; Vaterlaus, J.M.; Frost, L.R. College student cyberbullying on social networking sites: Conceptualization, prevalence, and perceived bystander responsibility. Comput. Hum. Behav. 2016, 55, 1097–1105. [Google Scholar] [CrossRef]
  7. Doane, A.N.; Ehlke, S.; Kelley, M.L. Bystanders Against Cyberbullying: A Video Program for College Students. Int. J. Bullying Prev. 2019, 2, 41–52. [Google Scholar] [CrossRef] [Green Version]
  8. Sarmiento, A.; Herrera-López, M.; Zych, I. Is cyberbullying a group process? Online and offline bystanders of cyberbullying act as defenders, reinforcers and outsiders. Comput. Hum. Behav. 2019, 99, 328–334. [Google Scholar] [CrossRef]
  9. Clark, M.; Bussey, K. The role of self-efficacy in defending cyberbullying victims. Comput. Hum. Behav. 2020, 2020, 106340. [Google Scholar] [CrossRef]
  10. Domínguez-Hernández, F.; Bonell, L.; Martínez-González, A. A systematic literature review of factors that moderate bystanders’ actions in cyberbullying. Cyberpsychol. J. Psychosoc. Res. Cyberspace 2018, 12, 1. [Google Scholar] [CrossRef] [Green Version]
  11. Cleveland, M.J.; Collins, L.M.; Lanza, S.T.; Greenberg, M.T.; Feinberg, M.E. Does individual risk moderate the effect of contextual-level protective factors? A latent class analysis of substance use. J. Prev. Interv. Community 2010, 38, 213–228. [Google Scholar] [CrossRef] [PubMed]
  12. Salmivalli, C. Bullying and the peer group: A review. Aggress. Violent Behav. 2010, 1, 112–120. [Google Scholar] [CrossRef]
  13. Pepler, D.; Craig, W.; O’Connell, P. Peer processes in bullying: Informing prevention and intervention strategies. In Handbook of Bullying in Schools: An International Perspective; Jimerson, S.R., Swearer, S.M., Espelage, D.L., Eds.; Routledge: London, UK, 2010; pp. 469–479. [Google Scholar]
  14. Latané, B.; Darley, J.M. The Unresponsive Bystander: Why Doesn’t He Help? Appleton-Century-Croft: New York, NY, USA, 1970. [Google Scholar]
  15. Dillon, K.P.; Bushman, B.J. Unresponsive or un-noticed? Cyberbystander intervention in an experimental cyberbullying context. Comput. Hum. Behav. 2015, 45, 144–150. [Google Scholar] [CrossRef]
  16. Choi, K.S. Computer crime victimization and integrated theory: An empirical assessment. Int. J. Cyber Criminol. 2008, 2, 308. [Google Scholar]
  17. Yu, M.; Riddle, K. An Experimental Test of the Effects of Digital Content Permanency on Perceived Anonymity and Indirect Effects on Cyber Bullying Intentions. Soc. Media Soc. 2022, 8, 20563051221087255. [Google Scholar] [CrossRef]
  18. Lapidot-Lefler, N.; Barak, A. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Comput. Hum. Behav. 2012, 28, 434–443. [Google Scholar] [CrossRef]
  19. Barlińska, J.; Szuster, A.; Winiewski, M. Cyberbullying among adolescent bystanders: Role of the communication medium, form of violence, and empathy. J. Community Appl. Soc. Psychol. 2013, 23, 37–51. [Google Scholar] [CrossRef]
  20. DeSmet, A.; Van Cleemput, K.; Bastiaensens, S.; Poels, K.; Vandebosch, H.; Malliet, S.; Verloigne, M.; Vanwolleghem, G.; Mertens, L.; Cardon, G.; et al. Bridging behavior science and gaming theory: Using the intervention mapping protocol to design a serious game against cyberbullying. Comput. Hum. Behav. 2016, 56, 337–351. [Google Scholar] [CrossRef]
  21. Choi, K.; Cho, S.; Lee, J.R. Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis. Comput. Hum. Behav. 2019, 100, 1–10. [Google Scholar] [CrossRef]
  22. Jenkins, L.N.; Nickerson, A.B. Bystander Intervention in Bullying: Role of Social Skills and Gender. J. Early Adolesc. 2019, 39, 141–166. [Google Scholar] [CrossRef]
  23. Barlett, C.P.; Gentile, D.A. Attacking others online: The formation of cyberbullying in late adolescence. Psychol. Pop. Media Cult. 2012, 1, 123–135. [Google Scholar] [CrossRef] [Green Version]
  24. Ellison, N.B.; Steinfield, C.; Lampe, C. The Benefits of Facebook Friends: Social Capital and College Students’ Use of Online Social Network Sites. J. Comput. Mediat. Commun. 2007, 12, 1143–1168. [Google Scholar] [CrossRef]
  25. Erdur-Baker, Ö.; Kavsut, F. Cyber bullying: A new face of peer bullying. Eurasian J. Educ. Res. 2007, 27, 31–42. [Google Scholar]
  26. Weber, M.; Ziegele, M.; Schnauber, A. Blaming the Victim: The Effects of Extraversion and Information Disclosure on Guilt Attributions in Cyberbullying. Cyberpsychol. Behav. Soc. Netw. 2013, 16, 254–259. [Google Scholar] [CrossRef]
  27. Holfeld, B. Perceptions and attributions of bystanders to cyber bullying. Comput. Hum. Behav. 2014, 38, 1–7. [Google Scholar] [CrossRef]
  28. DeWall, C.N.; Richman, S.B. Social Exclusion and the Desire to Reconnect. Soc. Personal. Psychol. Compass 2011, 5, 919–932. [Google Scholar] [CrossRef]
  29. DeWall, C.N. Forming a basis for acceptance: Excluded people form attitudes to agree with potential affiliates. Soc. Influ. 2010, 5, 245–260. [Google Scholar] [CrossRef]
  30. Mead, N.L.; Baumeister, R.F.; Stillman, T.F.; Rawn, C.; Vohs, K.D. Social Exclusion Causes People to Spend and Consume Strategically in the Service of Affiliation. J. Consum. Res. 2011, 37, 902–919. [Google Scholar] [CrossRef] [Green Version]
  31. Chester, D.S.; DeWall, C.N.; Pond, R.S., Jr. The push of social pain: Does rejection’s sting motivate subsequent social reconnection? Cogn. Affect. Behav. Neurosci. 2016, 16, 541–550. [Google Scholar] [CrossRef] [Green Version]
  32. Machácková, H.; Dedkova, L.; Ševčíková, A.; Cerna, A. Bystanders’ Support of Cyberbullied Schoolmates. J. Community Appl. Soc. Psychol. 2013, 23, 25–36. [Google Scholar] [CrossRef]
  33. Fanti, K.A.; Demetriou, A.; Hawa, V.V. A longitudinal study of cyberbullying: Examining riskand protective factors. Eur. J. Dev. Psychol. 2012, 9, 168–181. [Google Scholar] [CrossRef]
  34. Wang, G.F. The Progress of Object Relation Theory in Psychoanalysis. J. Nanjing Norm. Univ. (Soc. Sci. Ed.) 2012, 1, 114–119. [Google Scholar]
Figure 1. Five classes of the cyberbullying bystander (CBS) of the best fitting five class pattern.
Figure 1. Five classes of the cyberbullying bystander (CBS) of the best fitting five class pattern.
Ijerph 19 16083 g001
Table 1. Fit indices for the latent class models on the cyberbullying bystander for the total sample.
Table 1. Fit indices for the latent class models on the cyberbullying bystander for the total sample.
ModelKLogAICBICaBICEntropyLMRBLRTClass Probability
180−64,614.53129,389.05129,783.65129,529.56
2121−59,669.95119,581.89120,178.72119,794.410.980.000.000.40/0.60
3162−57,713,50115,751.00116,550.06116,035.530.980.000.000.20/0.20/0.60
4203−56,938.43114,282.86115,284.15114,639.400.950.000.000.19/0.46/0.20/0.16
5244−56,360.86113,209.71114,413.23113,638.260.950.000.000.10/0.10/0.18/0.46/0.16
6285−56,003.19112,576.39113,982.13113,076.950.960.120.000.09/0.07/0.14/0.09/0.46/0.16
Note. AIC = Akaike information criterion; BIC = Bayesian information criterion; aBIC = adjusted BIC; LMR = the Lo–Mendell–Rubin adjusted likelihood ratio test; BLRT = bootstrapped likelihood ratio test.
Table 2. Mean scores on bullying intervention as a function of the resulting latent classes.
Table 2. Mean scores on bullying intervention as a function of the resulting latent classes.
Defensive
Bystander
Indifferent BystanderLow-Involved BystanderMedium-Involved BystanderHigh-Involved BystanderFη2p
Notice2.65 ± 1.002.82 ± 0.952.93 ± 0.972.76 ± 0.793.14 ± 1.008.17 **0.03
Emergency3.57 ± 0.983.31 ± 0.923.40 ± 0.893.01 ± 0.803.43 ± 0.8512.53 **0.05
Responsibility3.42 ± 1.053.29 ± 0.933.11 ± 0.883.03 ± 0.813.42 ± 0.8910.71 **0.04
Know3.46 ± 0.953.37 ± 0.803.11 ± 0.823.11 ± 0.773.41 ± 0.898.82 **0.03
Act3.35 ± 1.863.16 ± 0.922.98 ± 0.892.91 ± 0.813.23 ± 0.9511.67 **0.04
Note. ** p < 0.01.
Table 3. Association of the influencing factors with different latent classes of the CBS.
Table 3. Association of the influencing factors with different latent classes of the CBS.
Factors Defensive
Bystander
Indifferent
Bystander
Medium-Involved BystanderHigh-Involved Bystander
ORCI (95%)ORCI (95%)ORCI (95%)ORCI (95%)
GenderFemale1.00 1.00 1.00 1.00
Male1.250.71~2.191.95 *1.06~3.562.011.22~3.312.19 **1.27~3.76
GradeGrade 41.00 1.00 1.00 1.00
Grade 11.030.47~2.261.380.59~3.261.940.98~3.831.840.87~3.87
Grade 21.470.74~2.901.530.71~3.262.151.17~3.971.530.77~3.03
Grade 31.570.80~3.101.120.51~2.441.450.78~2.711.260.63~2.52
Left-behind patternNot Left-Behind1.00 1.00 1.00 1.00
Father Migrant0.41 *0.19~0.880.26 **0.10~0.711.220.66~2.261.440.73~2.82
Mother Migrant0.23 *0.07~0.830.380.11~1.372.97 *1.30~6.802.88 *1.20~6.93
Two-Parent-Migrant0.580.30~1.130.590.28~1.230.560.30~1.030.560.27~1.13
Anonymity 0.950.66~1.360.840.57~1.210.850.62~1.150.750.52~1.09
SNS Intensity 1.400.92~2.131.180.75~1.870.810.56~1.181.91 *1.22~2.97
Cyber-
Victimization Experience
1.020.58~1.780.850.45~1.603.52 **2.16~5.743.99 **2.33~6.84
Note. * p < 0.05, ** p < 0.01.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jia, Y.; Wu, Y.; Jin, T.; Zhang, L. How Are Bystanders Involved in Cyberbullying? A Latent Class Analysis of the Cyberbystander and Their Characteristics in Different Intervention Stages. Int. J. Environ. Res. Public Health 2022, 19, 16083. https://doi.org/10.3390/ijerph192316083

AMA Style

Jia Y, Wu Y, Jin T, Zhang L. How Are Bystanders Involved in Cyberbullying? A Latent Class Analysis of the Cyberbystander and Their Characteristics in Different Intervention Stages. International Journal of Environmental Research and Public Health. 2022; 19(23):16083. https://doi.org/10.3390/ijerph192316083

Chicago/Turabian Style

Jia, Yanru, Yuntena Wu, Tonglin Jin, and Lu Zhang. 2022. "How Are Bystanders Involved in Cyberbullying? A Latent Class Analysis of the Cyberbystander and Their Characteristics in Different Intervention Stages" International Journal of Environmental Research and Public Health 19, no. 23: 16083. https://doi.org/10.3390/ijerph192316083

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop