Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2021 Nov 23;84(3):541–567. doi: 10.1007/s10734-021-00787-4

Hate and harassment in academia: the rising concern of the online environment

Atte Oksanen 1,, Magdalena Celuch 1, Rita Latikka 1, Reetta Oksa 1, Nina Savela 1
PMCID: PMC8609255  PMID: 34840344

Abstract

Hostile online communication is a global concern. Academic research and teaching staff are among those professionals who routinely give public comments and are thus vulnerable to online attacks. This social psychological and criminological study investigated online harassment victimization among university researchers and teachers. Survey participants (N = 2,492) were university research and teaching staff members from five major universities in Finland. Victimization was assessed with a 20-item inventory. The study included a wide range of both background and general measures on well-being at work. Participants also took part in an online experiment involving a death threat targeting a colleague. Results showed that 30% of the participants reported being victims of online harassment during the prior 6 months. Victims were more often senior staff members, minority group members, and from the social sciences and humanities. Those active in traditional or social media were much more likely to be targeted. Victims reported higher psychological distress, lower generalized trust, and lower perceived social support at work than non-victims. Individuals who were targeted by a colleague from their work community reported higher post-traumatic stress disorder scores and a higher impact of perceived online harassment on their work compared to other victims. In the experimental part of the study, participants reported more anxiety when a close colleague received a death threat. Participants also recommended more countermeasures to a close colleague than to an unknown person from the same research field. Results indicate that online harassment compromises well-being at work in academia. There is an urgent need to find ways of preventing online harassment, both in workplaces and in society at large.

Keywords: Online environment, Social media, Internet, Online harassment, Cyberharassment, Cyberhate, Cyberbullying, Media, Academia, Occupational well-being

Introduction

Hostile online communication is a growing global concern (Keipi et al., 2017; Reichelmann et al., 2020; Williams, 2021). Online harassment (i.e., cyberharassment) covers a wide range of intensive and hostile actions that target individuals or groups (Farley et al., 2021; Näsi et al., 2017; Nurse, 2019). These types of negative actions are also analyzed with the concepts of online hate (i.e., cyberhate; online hate speech) and online bullying (i.e., cyberbullying). Online hate is a special category of online harassment that involves targeting either individuals or groups of people with intensive and hostile statements and content, such as insults concerning sexual orientation, ethnic background, or appearance (Hawdon et al., 2017). Online bullying also overlaps with harassment, and it has typically been investigated in the context of school or work (Kowalski et al., 2018; Oksanen et al., 2020a; Zych et al., 2015). This article uses the term “online harassment” to cover a large range of attacks on individuals via written or graphic insults, picture and video manipulations, identity thefts, and violent threats, well-known phenomena in online harassment literature (Bocij & McFarlane, 2003; Durkin & Patterson, 2012; Keipi et al., 2017; Näsi et al., 2017). It should be noted that perpetrators’ tools have multiplied in recent years. For instance, deep fake videos may constitute a major potential threat for any public discussion in the years to come (Botha & Pieterse, 2020; Lazer et al., 2018; van der Linden et al., 2020).

Thus far, much of the research on online harassment, hate, and bullying has focused on children, adolescents, and young adults (Hawdon et al., 2017; Keipi et al., 2017; Kowalski et al., 2014; Wachs et al., 2021a, b; Zych et al., 2015). By contrast, there is a lack of studies investigating the adult population in this context (Farley et al., 2021; Faucher et al., 2015; Jenaro et al., 2018; Kowalski et al., 2014; Oksanen et al., 2020a; Pew Research Center, 2021). Further, studies on academic staff facing such threats are scarce (Blizard, 2016; Cassidy et al., 2016, 2017; Gosse et al., 2021; Hodson et al., 2018; Jane, 2018; Veletsianos et al., 2018).

Academic researchers and teachers are a professional group potentially vulnerable to online harassment for multiple reasons. In addition to institutional hierarchy, academia includes other power imbalances caused by, for example, academic successes or mentoring relationships. Such imbalances create a fitting environment for issues regarding envy, heresy, and abuses of power (DeSouza, 2011). Fierce competition within the academic community can have negative side effects as well. Indeed, past research indicates that offline bullying is common in university settings (DeSouza, 2011; Giorgi, 2012; Keashly & Neuman, 2010). Attacked scholars have shared accounts of offline microaggressions and bullying, followed by inadequate responses from their institutions (Pyke, 2018). Due to the competitive nature of academia, the costs of reporting or intervening are often considered too high, which then upholds malpractice.

Public engagement is now a vital part of many researchers’ professional lives, including substantial interactions in online environments (Davies, 2013). Researchers use academic social networking sites for many purposes, including self-promotion, networking, collaboration, and knowledge sharing (Yan & Zang, 2019). Social networking sites are also used to communicate with students and foster their engagement (Dyson et al., 2015; Sheeran & Cummings, 2018). However, such visibility leaves academics vulnerable to attacks from strangers, as having a profession that requires an online presence has been linked to online victimization (Pew Research Center, 2014). Lately, the COVID-19 pandemic has forced university research and teaching staff to move much of their professional lives online, a shift leading to many new challenges (Watermeyer et al., 2021) while further exposing professionals to potential online harassment.

This is the first study to investigate online harassment among university researchers and teachers that utilizes an experimental design and a novel approach to identify the predictors of victimization. We analyze the reasons for and consequences of victimization as well as how people react when others are targeted.

Risk factors and consequences for victims

Investigations of cybervictims have been theoretically grounded in social psychology and criminology (Keipi et al., 2017). Routine activities theory (RAT) is a major theory explaining the basic factors associated with victimization. According to RAT, crime takes place in a situation where a motivated offender and a suitable target are present, with a simultaneous lack of capable guardians (Cohen & Felson, 1979). Notably, such situations are very likely to happen in the online environment, where targets and offenders function in a shared space and guardianship is limited (Keipi et al., 2017). Although RAT was originally developed to describe the offline context, studies have successfully applied RAT to the online sphere (Hawdon et al., 2017; Holt & Bossler, 2008; Näsi et al., 2017; Wachs et al., 2021a, b). The online application of RAT takes into account that victims and offenders might share the same cyberspace without being present at exactly the same time; for example, a victimized person on Twitter might see an offending message much later (Reyns et al., 2011). Despite this asynchrony, cybervictimization has severe consequences for victims (Keipi et al., 2017).

RAT focuses on risk factors of victimization and states that individuals’ everyday routines can put them at risk of becoming targets of crimes by exposing them to dangerous circumstances. In the online context, a target’s visibility is one of the most crucial factors (Choi & Lee, 2017; Mikkola et al., 2021; Näsi et al., 2017), and for that reason, it is part of our focus in this article as well. Harassment may take place anywhere online, but social media sites are the most common places where such victimization occurs (Pew Research Center, 2021). Social media in this context refers to a wide variety of highly popular online platforms such as Facebook, Instagram, Twitter, and YouTube. In contrast to traditional media (e.g., television, radio, and newspapers), the content of social media is often disseminated by participants themselves. Social media thus makes it very easy to produce content and communicate with others (Keipi et al., 2017). On the basis of RAT, activity in the public sphere, via either traditional or social media, makes people potentially more exposed to offenders. According to the previous studies, the more visible potential victims are on different social media platforms, the more likely they are to be targeted (Keipi et al., 2017; Pew Research Center, 2021). Having a job that requires an online presence, or a job where the internet is an essential tool, as is the case for many researchers, is also a significant predictor of becoming a target (Kowalski et al., 2012).

In the general population, young women are especially likely to become targets of some of the most severe instances of online harassment (Pew Research Center, 2021). Also, people with minority status have been targeted based on their physical appearance and sexual orientation (Costello et al., 2019; Gosse et al., 2021). Previous studies have shown that online harassment against academics often targets minority members and women (Barlow & Awan, 2016; Cassidy et al., 2016; Kavanagh & Brown, 2020; Nagle, 2018; Veletsianos et al., 2018; Yelin & Clancy, 2020).

Personality traits are important in understanding online harassment as a phenomenon. The Big Five model is one of the most common and widely accepted taxonomies of human personality (Digman, 1990; John et al., 2008). Previous research has found high neuroticism, extroversion, and openness, as well as low agreeableness and conscientiousness to be associated with cybervictimization (ElSherief et al., 2018; Kowalski et al., 2012; Peluchette et al., 2015). Impulsivity has also been tied to offline and online victimization among adolescents and young adults (Álvarez-García et al., 2019; Bossler & Holt, 2010; Fanti et al., 2012; Kokkinos et al., 2014; López-Larrañaga & Orue, 2019; Mikkola et al., 2021; Pratt et al., 2014; Vazsonyi et al., 2012) and among the adult population (Nedelec, 2018). Impulsivity is related to co-occurring victimization both offline and online (Nedelec, 2018). Impulsive individuals are more likely to offend others (Fanti et al., 2012; Kokkinos et al., 2014; Vazsonyi et al., 2012; Zych et al., 2021) and less likely to help victims as bystanders (Erreygers et al., 2016).

Past research indicates that cyberharassed scholars may suffer a wide range of negative consequences, including various negative emotions, physical signs of stress, sleep problems, difficulty concentrating, post-traumatic stress disorder (PTSD) symptoms, suicidal thoughts, and long-lasting mental health effects such as anxiety and depression (Blizard, 2016; Cassidy et al., 2016, 2017). Cyberharassment can negatively influence scholars’ professional lives, causing a loss of productivity and self-confidence, thoughts of quitting one’s job, and lowered job satisfaction (Blizard, 2016; Cassidy et al., 2016, 2017; Coyne et al., 2017; Gosse et al., 2021).

Victims of attacks in academia often seek social support from colleagues, friends, family, supervisors, or therapists (Blizard, 2016; Cassidy et al., 2016, 2017). They use a wide range of coping strategies, usually implementing multiple methods at once, especially in cases of severe attacks (Veletsianos et al., 2018). However, online offences are often underreported, with studies suggesting that many, or even the majority, of targeted individuals do not report the event to any authorities (Blizard, 2016; Cassidy et al., 2016, 2017; Faucher et al., 2015). Reasons for not reporting to the police are tied to a lack of trust in police and the limited capability of law enforcement to solve these issues due to their complex nature and lack of necessary resources and expertise (Holt & Lee, 2019; Koziarski & Lee, 2020).

Social identity theory approach to bystander reactions

In social media, messages stay online for a prolonged time and may be visible to large groups of users. Because of this, online harassment is likely to involve bystanders who directly witness offensive acts. Thus, online attacks also have a potential impact on other people, for example, colleagues and family members of those who have been targeted (D’Cruz & Noronha, 2013). For these reasons, it is highly important to understand how people in general react to online harassment. Previous studies on bystanders have shown that they are more supportive when the target is closer to them (Dickter, 2012; Machackova et al., 2013). Also, perceived psychological closeness increases prosocial behavior (Korchmaros & Kenny, 2001; Lee & Kim, 2020; Passarelli & Buchanan, 2020). That is, if someone sees a close friend or family member in danger, they are more likely to help them or feel concerned.

The social identity theory (SIT) framework that was first introduced by Tajfel and Turner (1979) helps us to further understand how people react to online harassment. SIT proposes that people will form consequential group identities on a minimal basis (Abrams & Hogg, 2006; Brown, 2000; Tajfel & Turner, 1979; Turner et al., 1987). Individuals are then motivated to view their own in-group in a positive light (Turner et al., 1979) and can experience emotions associated with self-categorizing as a member of a social group (Smith & Mackie, 2015; Turner et al., 1987).

In accordance with SIT predictions, studies have shown that people feel more empathy toward in-group than outgroup members (Cikara et al., 2011; Vanman, 2016). Empathy may, in turn, drive bystanders to help cyberbullying victims (Erreygers et al., 2016; Freis & Gurung, 2013; Kowalski et al., 2014; Lambe et al., 2019; Machackova & Pfetsch, 2016; Van Cleemput et al., 2014). Empathizing with the victim generates a co-victimization experience and causes stress, which may motivate individuals to defend the victim (Coyne et al., 2019). Importantly, feeling empathy can be a target-dependent state. For instance, individuals are motivated to feel more empathy toward people who share their political views (Hasson et al., 2018). Like-mindedness has been argued to be a stand-alone reason for feeling empathy toward an individual (Stevens et al., 2020).

Based on these perspectives, we expected that both closeness to and like-mindedness with the victim explain how people react when witnessing online harassment. Feeling concerned for closely connected or similarly minded others is easy due to group membership, and it may facilitate reacting against online harassment and supporting the victims. In addition, both closeness and like-mindedness are important factors of social identity that can be threatened if other in-group members are targeted, making it more necessary for bystanders to react.

This study

Our aim was to investigate online harassment among research and teaching staff. The study adds to the discussion within higher education studies on public engagement and the use of social media by academic staff. This study is grounded in theoretical paradigms of cybervictimization and both criminological and social psychological theories that help to understand why and how academic staff are victimized, what the general consequences are of hate and harassment, and potential reactions toward it.

The first part of our analysis investigated the risk and protective factors of online harassment victimization. Our main hypothesis was that both traditional media and social media presence are associated with online harassment victimization (H1). This hypothesis was based on empirical research on RAT showing that visibility of the potential victim increases the likelihood of victimization. In other words, individuals who are often present in traditional and social media become targeted. Our analysis considered other risk factors, including background factors and personality, but exact hypotheses were not made due to the lack of previous studies among research staff.

The second part of the analysis focused on the potential consequences of online harassment on well-being and professional life. Our main hypothesis was that online harassment victims differ from non-victims (H2). This hypothesis was generally based on previous studies on online victimization.

The third part of the analysis was based on the experimental design investigating reactions to online harassment. Within our experiment, we investigated whether reactions to a death threat were more severe when the victim was close to or like-minded with the subject. Our hypotheses were preregistered to Open Science Forum (Oksanen et al., 2020b). We expected that closeness to the victim would increase both state anxiety (H3a) and the number of suggested countermeasures (H3b). We also expected that like-mindedness with the victim increased both state anxiety (H4a) and the number of suggested countermeasures (H4b).

Method

Participants and procedure

Participants (N = 2,492) of this study were university research and teaching staff members from five major universities in Finland that were geographically diverse, representing major universities in the southern, western, eastern, and northern parts of the country. Participants were 53.17% female, 46.31% male, and 0.52% other gender, and the mean age was 43.24 years (SD = 11.21). Participants were sampled based on contact information received from HR departments and university websites. The random sample included half of the university staff from each university. All participants were contacted by email, and the data was collected between 15 April and 5 June 2020. The overall response rate was 50.06%, and 40.79% finished the survey. Participants who completed the full survey were included in this study. There was no major bias due to the non-response based on the analysis of age and gender distributions. There were slightly more female participants compared to investigated universities (53.17% vs. 48.05%), but the mean age was almost the same (43.24 vs. 43.43 years).

Participants were asked about their experiences with online harassment due to their work. Those who reported victimization during the prior 6 months were asked where the acts took place, whether they knew the perpetrator, whether they reported the actions to someone, and what the consequences of the victimization were. In addition, the survey included background information and measures on personality and well-being. Median response time to the survey was 14:45 min. The survey was conducted in both Finnish and English.

The survey also included a survey experiment that was preregistered to Open Science Forum (Oksanen et al., 2020b). Participants were randomly assigned to one of four different groups and asked to imagine a situation where someone had received a personal death threat on social media after giving a public interview. This between-subject experiment manipulated (a) closeness to the victim (close colleague/unknown person from the same research field) and (b) like-mindedness (agrees with the interview statements/disagrees with the interview statements). Anxiety and countermeasure reactions were asked of the participants after this. These are explained in the “Measures” section.

Participation was voluntary, and the participants were informed about the study’s aims. They were assured that they could stop at any time and delete their information when answering to the survey. The research group administered the data collection. The academic ethics committee of Tampere region in Finland stated (decision 17/2020) that the study protocol did not include any ethical concerns.

Measures

Online harassment victimization

We measured whether participants had been victims of online harassment during the prior 6 months following situations at their work or because of their work. Participants filled out a 20-item inventory on different forms of online hate and harassment, from personal insults (e.g., “attacks against you as a person, your values, or your personal life have been made”) to violent threats (e.g., “you have been threatened with violence”) (see Appendix Table 5 for the full list). The response options ranged from “never” to “daily.” Some inventory items were based on items of a “cyberbullying at work” survey (Forssell, 2016; Oksanen et al., 2020a), and others were from studies investigating online harassment and hate in general (Keipi et al., 2017; Reichelmann et al., 2020).

Table 5.

During the past 6 months, how often have you faced the following situations at work, or because of your work, on the Internet or social media?

Items with exact wording Yes at least sometimes
You have received offending and angry messages via social media 15.97%
Attacks against you as a person, your values, or your personal life have been made 13.76%
Your appearance has been criticized 4.49%
You have been underestimated or criticized because of your gender 9.79%
You have been underestimated or criticized because of your age 7.14%
You have been attacked because of your sexual orientation 1.52%
You have been attacked because of your skin color, heritage, or national or ethnic origin 5.42%
You have been attacked because of your religion or ideology 6.54%
You have been sexually harassed 5.66%
Your professional skills have been underestimated unjustifiably and beyond normal critique 16.69%
Extracts of your messages have been copied so that the meaning of the original message is distorted 8.47%
Offensive photos/videos of you have been posted on social media 1.04%
Photo or video manipulations of you have been published 0.88%
False statements about you have been spread on social media 8.19%
You have been shamed or targeted (e.g., other people have been provoked to attack you) on social media 4.29%
Someone has impersonated you (identity theft) 1.36%
You have been threatened with violence 2.81%
Your life has been threatened 0.96%
Threatening messages about your friends/family have been sent to you via social media 1.36%
Threatening messages have been sent to your children or close ones with the intention to scare you 0.56%

Response options to each item were:

Never

Sometimes

Monthly

Weekly

Daily

Background factors

Background factors included gender and age. Participants were also asked whether they considered themselves a member of a minority group, whether they had a PhD degree, a long-term contract, and whether they were in a managerial position. The scientific field was assessed with a longer list of questions but categorized into five major groups: natural sciences, engineering and technology, medical and health sciences, humanities, and social sciences.

Target availability

We based target availability measures on RAT and cybervictimization research (Holt & Bossler, 2008; Näsi et al., 2017; Williams, 2016). Measures included media appearances asked with the question: “How often are you on TV, radio, or in the newspaper because of your work?” A dummy variable was created indicating those who had media appearances at least monthly (0 = no, 1 = yes). We also asked about how often they wrote messages or posted content to the most popular social media sites. A dummy variable was created indicating those who wrote messages or posted content to Facebook, Twitter, Instagram, YouTube, LinkedIn, blogs, or discussion forums on a weekly basis (0 = no, 1 = yes). Victimization by other means was asked with the question: “Have you received abusive or threatening messages through other means than via the internet and social media?” Those who selected victimization via telephone, messages (e.g., text messages), mail, or face-to-face were categorized as victims (0 = no victimization by other means, 1 = victimization by other means). In addition, we asked whether participants had attacked others with the question: “During the past 6 months, how often have you sent abusive or threatening messages to other people?” Those selecting sometimes or more often were categorized as offending others (0 = does not offend others, 1 = has offended others).

Personality

We measured personality traits with a 15-item Big Five inventory (Hahn et al., 2012). Each item had response options from 1 (strongly disagree) to 7 (strongly agree). For each personality trait, we created a 3-item sum variable ranging from 3 to 21. Inter-item reliability based on McDonald’s omega ranged from acceptable to good: openness (ω = 0.68), conscientiousness (ω = 0.55), extroversion (ω = 0.85), agreeableness (ω = 0.61), and neuroticism (ω = 0.79). Impulsivity was measured with the Eysenck Impulsiveness Scale (Eysenck & Eysenck, 1978). Response options were no (0) and yes (1) for all questions. This measure was recently used and validated in other cybervictimization research (Mikkola et al., 2021; Zych et al., 2021). It showed an acceptable inter-item reliability: ω = 0.72. The scale ranged from 0 to 5 (M = 0.95, SD = 1.32), with higher scores indicating higher impulsiveness.

Well-being

Our study included several established measures aimed at estimating the general well-being of the participants at work. Work engagement was measured with the Utrech Work Engagement Scale (UWES-9) (Schaufeli & Bakker, 2004). The measure showed excellent inter-item reliability: ω = 0.94. The scale ranged from 0 to 54 (M = 42.31, SD = 9.53), with higher scores indicating higher work engagement. Psychological distress was measured with a 12-item general health questionnaire (GHQ-12; Goldberg et al., 1997). The measure showed excellent inter-item reliability: ω = 0.87. Likert coding (0–1–2–3) was applied, and the scale ranged from 0 to 36 (M = 13.08, SD = 5.51), with higher scores indicating higher psychological distress. Self-esteem was measured with a single-item self-esteem scale including a statement: “I have high self-esteem” (Robins et al., 2001). The scale ranged from 1 (not very true of me) to 7 (very true of me; M = 5.00, SD = 1.40). Generalized trust was measured with the standardized single-item measure: “Generally speaking, would you say that most people can be trusted, or that you can’t be too careful in dealing with people?” (Delhey & Newton, 2005; Uslaner, 2002). The response scale ranged from 1 (Need to be very careful in dealing with people) to 7 (Most people can be trusted; M = 5.10, SD = 1.59). Perceived social support at work was assessed with a 3-item scale that asked about help and support gained from colleagues, closest supervisor, and employer. All items had response options ranging from 1 (not at all likely) to 7 (very likely). The scale had a good inter-item reliability, ω = 0.79, and a range from 3 to 21 (M = 14.97, SD = 4.36), with higher scores indicating perceived support at work. All participants were asked a single-item measure about the perceived impact of online harassment on work: “Has the generalization of hostile, harassing, or threatening speech affected your actions as a professional in your own field?” The scale ranged from 1 (not at all) to 7 (very much so; M = 1.90, SD = 1.41). Negative impacts of online harassment on the victims were assessed with a trauma screening questionnaire designed to screen PTSD (Brewin et al., 2002). In our adapted 10-item scale, we asked participants to report symptoms occurring at least twice during the past week. The scale had a good inter-item reliability, ω = 0.76, and a range from 0 to 10 (M = 0.90, SD = 1.57).

Experiment

A six-item short-form of the state scale of the Spielberger State—Trait Anxiety Inventory (STAI-6, Marteau & Bekker, 1992) was adapted to measure perceived state anxiety in the experiment after reading the hypothetical scenario on death threats. On average, the inter-item reliability of the scale was good in all scenarios (M ω = 0.84; range from 0.81 to 0.85). The scale had a range from 6 to 42. Participants were also asked several questions about the 10 countermeasures they would suggest to the victim, for example, blocking the perpetrator, turning to counseling, and reporting the incident to the police (see Appendix 2 for the full list). Table 1 reports the exact wording given for each experimental group and the means of their anxiety and reaction scores.

Table 1.

Descriptive overview of four experimental groups (n = 2,490)

Group 1 (close & like-minded victim) Group 2 (close & differently minded victim) Group 3 (not close & like-minded victim Group 4 (not close & differently minded victim
Wording Think about a situation in which your close colleague gives a public interview. You completely agree with the views given in the interview. After the interview he/she will get a death threat personally on social media Think about a situation in which your close colleague gives a public interview. You completely disagree with the views given in the interview. After the interview he/she will get a death threat personally on social media Think about a situation in which an unknown person from your field gives a public interview. You completely agree with the views given in the interview. After the interview he/she will get a death threat personally on social media Think about a situation in which an unknown person from your field gives a public interview. You completely disagree with the views given in the interview. After the interview he/she will get a death threat personally on social media
n 593 664 612 621
M (SD) anxiety 30.97 (7.57) 31.53 (7.31) 28.64 (7.65) 28.88 (7.12)
M (SD) suggested countermeasures 2.33 (1.12) 2.42 (1.21) 2.20 (1.03) 2.23 (1.10)

Statistical analyses

We conducted all analyses with Stata 16. Descriptive methods were used to provide the data’s general characteristics and to investigate differences between victims and non-victims and different types of victims. Statistical significances were tested with the chi squared test (χ2) for categorical variables and the 2-tailed t-test for continuous variables. We also reported effect sizes with Cramér’s V for categorical variables and Cohen’s d for continuous variables.

Regression models further investigated the associations. Our first goal was to analyze with logistic regression those who were victims of online harassment. We reported odd rations (OR), their 95% confidence intervals, average marginal effects, and p-values for statistical significance. Average marginal effects (AME) indicate how much the likelihood of the investigated phenomenon increases when the independent variable increases by one unit. AME coefficients are hence often more concrete than standard odds ratios and are more reliable when comparing results from different logistic models (Mood, 2010). Model statistics included pseudo coefficients of determination (Cragg-Uhler/Nagelkerke pseudo R2). Assumptions of logistic regression were met, and we did not find issues with multicollinearity.

Ordinary least squares regression was used for the analysis of work engagement, psychological distress, self-esteem, generalized trust, perceived social support, and perceived impact of online harassment on work. These were all used separately as dependent variables. We first investigated the differences between victims and non-victims (n = 2479) and then differences between different types of victims (n = 744). All models were adjusted for gender, age, scientific field, education, contract type, managerial position, and minority status. For model estimation reasons, those identifying as other gender were dropped from the regression models. We reported unstandardized regression coefficients (B) and their robust Huber–White standard errors (B SE), standardized beta coefficients (β), and p-values. Robust standard errors were used due to the heteroskedasticity of residuals. We also tested other assumptions of OLS and found no issues that could cause bias to the results.

For analyzing the experiment’s results, we used analysis of variances (ANOVA). Bartlett’s test for equality of variances showed no issues with manipulated factors in state anxiety. In terms of the analysis of suggested countermeasures, issues were found with unequal variance. We solved the issue with square root transformation of the suggested countermeasures variable. Our sample size was large (N = 2,492), and for this reason, we were not concerned with minor violations to normality in general. With larger sample sizes, the issue of assumption of normality is not considered crucial (Tabachnick & Fidell, 2013; Waternaux, 1976). All experimental groups were relatively equal in size. We reported the degrees of freedom (df), mean squares (MS), F-test value (F), statistical significance (p), and partial eta-squared (η2p).

Results

Characteristics of online harassment victims

Among university research and teaching staff participants (N = 2,492), 30.06% (n = 749) reported exposure to online harassment at least sometimes during the prior 6 months. The prevalence of victimization ranged from 27.09 to 31.84% in five universities, but the differences between universities were not statistically significant. The percentage of those reporting monthly victimization was 5.18%, and 1.18% reported weekly victimization during the investigated period.

The most common forms of online harassment involved excessive criticism going beyond normal critique (16.69%), receiving offending and angry messages (15.97%), and attacks against participants as persons (13.76%). Notably, relatively many reported clearer cut victimization to things such as identity theft (1.36%), violent threat (2.81%), and death threat (0.96%). Those victimized (n = 749) reported, on average, victimization to four asked categories (M = 3.89, SD = 2.94).

Women reported more commonly than men that they were underestimated or criticized online because of their gender (13.51% vs. 5.20%, χ2 = 48.90, p < 0.001) and that they were sexually harassed online (8.00% vs. 2.69%, χ2 = 33.36, p < 0.001). Men reported more often than women that they were attacked online because of their religion or ideology (7.97% vs. 5.13%, χ2 = 8.24, p = 0.004).

Out of the victims of online harassment, 42.99% knew the perpetrators, 33.11% did not know the perpetrators (but they were using their own names), and 23.90% said that offenders used pseudonyms or were otherwise unknown to the participant. In 17.76% (n = 133) of the cases, the perpetrator was a member of the respondent’s work community at their university.

Out of the victims, only 16.29% reported the event to their supervisors and 3.34% to the police. We asked about several reasons why the victims did not report the acts to the police: 76.10% of them considered that the act was not serious enough. In addition, out of victims 22.79% stated that they did not believe anything would have been done to the case.

It is remarkable that almost half (45.95%) of those who had been threatened with violence considered the act to be not serious enough to report it to police. The same is valid for victims of other types of online harassment. For example, 47.06% of identity theft victims considered the act not serious enough to report it to police.

Comparison of victims and non-victims

Comparisons of victims and non-victims are portrayed in Table 2. The results showed that there were no statistically significant differences between genders. Age was only significant in the descriptive findings (χ2[2] = 29.77, p < 0.001, V = 0.11), but not in the full logistic model (Cragg-Uhler pseudo-R2 = 0.203). Those with minority identity status reported more victimization in the descriptive findings (χ2[2] = 14.95, p < 0.001, V = 0.08) and in the full logistic model (OR = 1.55, AME = 0.078, p = 0.001). Descriptive findings also showed differences between scientific fields (χ2[4] = 46.32, p < 0.001, V = 0.14). Victimization was particularly high among social scientists and humanists. Of the social scientists, 37% reported victimization. In the full model adjusting the number of factors, they reported on average 9% higher victimization than the reference group of natural scientists (AME = 0.087, p < 0.001). Those having a PhD degree reported higher victimization than others in both the descriptive analysis (χ2[1] = 41.11, p < 0.001, V = 0.13) and logistic model (OR = 1.57, AME = 0.079, p < 0.001). Those in managerial positions reported higher victimization in both the descriptive analysis (χ2[1] = 35.13, p < 0.001, V = 0.12) and logistic model (OR = 1.41, AME = 0.060, p = 0.006).

Table 2.

Descriptive statistics and logistic regression model on online harassment victimization among university research and teaching staff in Finland (N = 2,492)

Victim Logistic model
n (no) % (no) n (yes) % yes) p OR 95% CI AME p
Background
  Gender 0.190
    Male 827 71.66 327 28.34 ref ref ref ref ref
    Female 908 68.53 417 31.47 1.03 0.83 1.27 0.005 0.798
    Other 8 61.54 5 38.46 - - - - -
  Age  < 0.001
     > 50 449 63.33 260 36.67 ref ref ref ref ref
    31–50 1,025 70.98 419 29.02 0.91 0.61 1.37 -0.017 0.653
     ≤ 30 269 79.35 70 20.65 0.83 0.65 1.05 -0.033 0.125
  Minority identity  < 0.001
    No 1,517 71.42 607 28.58 ref ref ref ref ref
    Yes 226 61.41 142 38.59 1.55 1.20 2.00 0.078 0.001
  Scientific field  < 0.001
    Natural sciences 578 77.69 166 22.31 ref ref ref ref ref
    Engineering and tech 217 73.31 79 26.69 1.44 1.02 2.01 0.063 0.035
    Medical & health sci 265 71.24 107 28.76 1.23 0.90 1.68 0.035 0.187
    Humanities 251 63.87 142 36.13 1.50 1.10 2.03 0.070 0.009
    Social sciences 432 62.88 255 37.12 1.63 1.26 2.12 0.087  < 0.001
  PhD degree  < 0.001
    No 672 78.05 189 21.95 ref ref ref ref ref
    Yes 1,071 65.67 560 34.33 1.57 1.22 2.02 0.079  < 0.001
  Long-term contract 0.003
    No 1,045 72.27 401 27.73 ref ref ref ref ref
    Yes 698 66.73 348 33.27 0.88 0.71 1.10 –0.022 0.274
  Managerial position  < 0.001
    No 1,388 72.98 514 27.02 ref ref ref ref ref
    Yes 355 60.17 235 39.83 1.41 1.10 1.79 0.060 0.006
Target availability
  Media appearances monthly  < 0.001
    No 1,697 72.03 659 27.97 ref ref ref ref ref
    Yes 46 33.82 90 66.18 2.87 1.91 4.31 0.187  < 0.001
  Weekly some postings  < 0.001
    No 1,208 77.29 355 22.71 ref ref ref ref ref
    Yes 535 57.59 394 42.41 2.12 1.74 2.57 0.133  < 0.001
  Victim by other means  < 0.001
    No 1,514 74.99 505 25.01 ref ref ref ref ref
    Yes 229 48.41 244 51.59 2.64 2.10 3.32 0.172  < 0.001
  Has offended others  < 0.001
    No 1,735 70.39 730 29.61 ref ref ref ref ref
    Yes 8 29.63 19 70.37 5.71 2.22 14.74 0.309  < 0.001
Personality M (no) SD (no) M (yes) SD (yes) p
  Openness 15.26 3.32 16.17 3.08  < 0.001 1.05 1.02 1.09 0.009 0.001
  Conscientiousness 14.48 3.13 14.82 3.22 0.014 1.02 0.98 1.05 0.003 0.331
  Extroversion 12.80 4.35 13.86 4.09  < 0.001 1.01 0.99 1.04 0.002 0.406
  Agreeableness 15.27 2.96 14.96 3.06 0.015 0.96 0.93 1.00  − 0.006 0.032
  Neuroticism 12.47 4.05 12.16 4.05 0.077 1.00 0.97 1.02 0.000 0.880
  Impulsivity 0.85 1.24 1.18 1.46  < 0.001 1.14 1.06 1.23 0.023  < 0.001

Analysis of target availability factors in Table 2 shows that monthly media appearances and weekly social media postings were strongly associated with being a victim (p < 0.001) in both descriptive analyses and the full logistic model. For example, two-thirds of the participants who had monthly appearances in the media reported online harassment victimization, while less than a third of those who did not have monthly appearances in the media were targeted (χ2[1] = 89.28, p < 0.001, V = 0.19). They were also more likely to be victims than others based on the full model (OR = 2.87, AME = 0.187, p < 0.001). Similar effect sizes were found for weekly social media postings in the descriptive analyses (χ2[1] = 107.55, p < 0.001, V = 0.21) and full logistic model (OR = 2.12, AME = 0.133, p < 0.001). Victims of online harassment also reported significantly more victimization by other means, such as telephone or face-to-face, based on descriptive findings (χ2[1] = 128.72, p < 0.001, V = 0.23) and the full model (OR = 2.64, AME = 0.172, p < 0.001). Those participants who reported offending others (n = 27, 1.08% out of all participants) had a very high likelihood of personal victimization, and over 70% of them were victims (χ2[1] = 21.10, p < 0.001, V = 0.09). In the full adjusted model, they had on average a 31% higher rate of victimization than those not offending others (AME = 0.309, p < 0.001).

The analysis of personality in Table 2 shows evidence that impulsivity was linked to online harassment victimization in the descriptive analysis (t[2490] = 5.72, p < 0.001, d = 0.25). In the full logistic model, impulsivity was also associated with online harassment victimization (OR = 1.14, AME = 0.02, p < 0.001). Analysis of Big Five personality traits showed that higher openness (t[2490] = 6.35, p < 0.001, d = 0.28), higher conscientiousness (t[2490] = 2.47, p = 0.014, d = 0.11), higher extroversion (t[2490] = 5.69, p < 0.001, d = 0.25), and lower agreeableness (t[2490] = 2.43, p = 0.015, d = 0.11) were associated with online harassment victimization. Out of these, only higher openness (OR = 1.05, AME = 0.009, p = 0.001) and lower agreeableness (OR = 0.96, AME = 0.006, p = 0.032) were associated with online harassment victimization in the full model.

The comparison of victims, non-victims, and different types of victims is reported in Table 3. Descriptive analysis based on t-tests showed that victims of online harassment reported higher psychological distress (t[2490] = 2.52, p = 0.012, d = 0.11), higher self-esteem (t[2490] = 2.46, p = 0.014, d = 0.11), lower generalized trust (t[2490] = 2.91, p = 0.004, d = 0.13), and low perceived social support at work (t[2490] = 6.18, p < 0.001, d = 0.27). The victims believed that hostile, harassing, or threatening speech had affected their actions as professionals (t[2490] = 3.08, p = 0.002, d = 0.13). Regression models further investigated the differences between victims and non-victims while adjusting for gender, age, scientific field, education, contract type, supervisory position, and minority status. The results showed that victims of online harassment reported higher psychological distress (β = 0.07, p = 0.001), lower generalized trust (β =  − 0.08, p < 0.001), and low perceived social support at work (β =  − 0.11, p < 0.001).

Table 3.

Comparison of victims and non-victims and different types of victims (t-test mean comparison and regression models)

All (N = 2,492) Victim of harassment or hate Effects for victims in models (n = 2,479)
No Yes p B SE (B) β p
Work engagement 42.19 42.61 0.316  − 0.43 0.43  − 0.02 0.315
Psychological distress 12.89 13.50 0.012 0.86 0.24 0.07  < 0.001
Self-esteem 4.96 5.11 0.014 0.06 0.06 0.02 0.334
Generalized trust 5.17 4.96 0.004  − 0.28 0.07  − 0.08  < 0.001
Perceived social support 15.32 14.15  < 0.001  − 1.01 0.20  − 0.11  < 0.001
Perceived impact of hate and harassment on work 1.84 2.03 0.002 0.11 0.06 0.04 0.091
Among victims (n = 749) Perpetrator from the University community Effects for victims in models (n = 744)
No Yes p B SE (B) β p
PTSD 0.73 1.71  < 0.001 0.95 0.19 0.23  < 0.001
Work engagement 42.99 40.85 0.024  − 2.31 1.02  − 0.09 0.024
Psychological distress 13.52 13.39 0.809  − 0.42 0.59  − 0.03 0.474
Self-esteem 5.14 4.94 0.134  − 0.16 0.15  − 0.04 0.275
Generalized trust 5.01 4.76 0.106  − 0.23 0.16  − 0.06 0.155
Perceived social support 14.37 13.12 0.005  − 1.29 0.47  − 0.11 0.006
Perceived impact of hate and harassment on work 1.91 2.57  < 0.001 0.62 0.17 0.16  < 0.001

Table 3 includes an analysis of online harassment victims whose cases had the perpetrators coming from outside and inside the work community. Those victims whose perpetrators came from the university community reported higher PTSD scores (t[2490] = 6.76, p < 0.001, d = 0.65), lower work engagement (t[2490] = 2.26, p = 0.024, d = 0.22), lower perceived social support (t[2490] = 2.81, p = 0.005, d = 0.27), and a higher perceived impact of online harassment on work (t[2490] = 4.73, p < 0.001, d = 0.45). The same factors remained statistically significant in the regression models adjusting for gender, age, scientific field, education, contract type, supervisory position, and minority status. The results showed that victims whose perpetrators came from the university community reported higher PTSD scores (β = 0.23, p < 0.001), lower work engagement (β =  − 0.09, p = 0.024), lower perceived social support at work (β =  − 0.11, p = 0.006), and higher perceived impact of online harassment on work (β = 0.16, p < 0.001).

Reactions to death threat in the experiment

The last part of our analysis used an experiment involving a hypothetical death threat to another person. Participants were asked how anxious they felt about the situation and what kind of recommendations they would give to the person facing a death threat. Manipulated factors were closeness and like-mindedness to the victim. Descriptive results on the group differences are reported in Table 1 and show that groups 1 and 2 involving a close victim reported higher anxiety and a number of suggested countermeasures than groups 3 and 4 involving not being close to the victim. The one-way ANOVA results for the four groups showed statistically significant differences between groups on analysis of anxiety (F[3,2489] = 24.47, p < 0.001) and reactions (F[3,2489] = 4.39, p = 0.004). A pairwise comparison of means using Tukey’s honest significant difference test indicated that groups involving being close to the victim reported higher anxiety and number of countermeasures than groups involving not being close to the victim.

A two-way ANOVA was run to analyze the effect of closeness (close vs. not close) and like-mindedness (like-minded vs. non-like-minded). Results are reported in Table 4. Participants expressed higher anxiety when the victim was close to them (F[1,2486] = 70.35, p < 0.001), and they suggested more countermeasures (F[1,2486] = 10.57, p = 0.001). Like-mindedness did not have any effect in the analyses. The effect sizes (ηp2) of the suggested countermeasures were below 0.01 and could be considered very weak.

Table 4.

Two-way ANOVA of anxiety cause by the situation and recommendations given for the victim in a death threat experiment

Anxiety Recommendations
Measure df MS F p ηp2 df MS F p η p2
Close 1 3865.48 70.35  < 0.001 0.028 1 1.87 10.57 0.001 0.005
Like-minded 1 98.79 1.80 0.180 0.001 1 0.14 0.8 0.371 0.000
Close X like-minded 2 16.23 0.30 0.587 0.000 1 0.24 1.36 0.244 0.001
Residual 2,486 54.94 2,486 0.18
Total 2,489 56.50 2,489 0.18

Recommendations variable was square root transformed

Discussion

Results overview

This study investigated online harassment victimization among university researchers and teachers. Results showed that 30% reported victimization to online harassment during the prior 6 months, with 5% reporting victimization on a monthly basis and 1% on a weekly basis. Victims were more often senior staff members, minority group members, and from social sciences and humanities. In over half of the cases, the perpetrator was a person unknown to the victim. Only 16% of the victims reported the attack to their supervisors and 3% to the police, although many had faced serious offences (e.g., violent threats).

Those active in traditional media or social media were victims significantly more often, which confirmed H1. This result is in line with previous empirical findings on the relationship between online activity and victimization (Choi & Lee, 2017; Keipi et al., 2017; Williams, 2016), previous research on visibility on social media platforms (Näsi et al., 2017; Pew Research Center, 2021), and job-related usage of the internet and online presence (Kowalski et al., 2012; Oksanen et al., 2020a) as determining factors of becoming a target.

Our results provided confirmation for H2 because victims reported higher psychological distress, lower trust, and lower perceived social support at work than non-victims. Victims who were targeted by a member of their university community reported higher PTSD symptoms and higher perceived impacts of online harassment on work than other victims. Previous studies on cyberbullying at work have indicated similar associations of detrimental effects to the victims (Blizard, 2016; Cassidy et al., 2017; Oksanen et al., 2020a).

Results based on our online experiment confirmed our preregistered hypotheses (H3a and H3b) because participants reported more anxiety and were more willing to suggest countermeasures when a close colleague faced a death threat rather than an unknown person from the same field. Hypotheses (H4a and H4b) on like-mindedness were not confirmed. Although group memberships, especially online, are often based on like-mindedness only, this is a weaker factor for group membership than directly indicated closeness. Overall, our results bring important new experimental evidence on bystanders’ reactions. Previously, bystanders of online hate and harassment have been studied only with correlational designs.

Theoretical and practical implications

Our research was based on both criminological and social psychological theories. We believe the combination of these two is important in understanding online harassment and making the contribution meaningful to higher education studies. Social psychological theories on group behavior are especially crucial when analyzing online behavior. Our results indicate that closeness of others had an impact on how strongly people reacted to online harassment. This has practical implications in terms of how bystanders might react only to assaults against their close colleagues. Within social media platforms, such passivity might lead to further problems, because social media platforms have been quite ineffective in managing online aggression over the years. Our study expands both theoretically and empirically the current discussion in higher education studies on the social media usage and public engagement of academic staff. The online environment is rapidly changing in alarming directions, and focus should be placed on malicious activities directed against academics who may be facing increasing pressure to be active in social media. These demands are especially accentuated in light of the shift to remote work brought about by the COVID-19 pandemic.

Hostile, hateful, and harassing behavior has become a mainstream and highly common phenomenon on Facebook and Twitter, which has serious implications for democracy and freedom of speech (Hawdon et al., 2017; Keipi et al., 2017; Reichelmann et al., 2020). The European Commission (2020) recently proposed a legislative renewal for digital services that would put pressure on largest online platforms to take a more active stance against illegal content online. This is highly critical because social media users can only partially protect themselves from being attacked. One of our most important findings was that their mere presence on traditional or social media put researchers at risk for being targeted for online harassment. For these reasons, it is highly important that both service providers and legal officials aim to control the problem.

In our data, online harassment victims were reluctant to report even serious crimes such as death threats to the police because they thought the crime was not serious enough and that reporting it would not lead to any actions. These troubling results indicate that a greater problem of cybercrime is not being recognized as quite as serious as offline offences, despite its clearly negative outcomes both for the victim and society in general. This points to the need for education aimed at increasing understanding of the seriousness of hostile, hateful, and harassing communication online, as well as for a larger discussion considering the possibilities of holding the perpetrators accountable and providing victims with help on an institutional level. The last point is especially important because the authorities’ interventions are often seen as not helpful enough. For instance, a UK study of women involved in online discussions about feminist politics found that only 16% of online harassment victims who reported the offence to the police were satisfied with the intervention’s results (Lewis et al., 2017). This indicates that mere reporting to the police is not enough to combat the problem of hostile online behavior.

Our last implications involve universities as workplaces since the results indicated that online harassment endangers employees’ well-being. Many academics work on short-term contracts and compete for positions and research funding. Both offline and online bullying is a noted problem within academia (DeSouza, 2011). In our study as well, some reported perpetrators of online harassment were from academia. This indicates that online harassment offenders should not be disregarded as merely outsiders. Those victims whose perpetrators came from the university community reported higher PTSD symptoms and lower work engagement, indicating that universities should take the problem very seriously. Furthermore, university staff cannot be passive when facing online harassment. Our results suggest that there are many passive bystanders. Overcoming online harassment faced by university staff will require undertaking actions on many levels. It is not enough for individuals to help only their closest colleagues, as the problem itself concerns everyone. Moreover, explicit procedures on how to report and deal with online harassment are much needed. Along with information on support chains available at the organization, this should include instructions on technical countermeasures offered by social media services. Providing materials on the possibilities of restricting others’ access to an individual’s social media profile and output (e.g., blocking, reporting to site administrators, restricting commenting, and direct messaging) can help scholars feel safe and in control online, allowing them to continue to share their work with the public.

Limitations and future directions

Despite having the strength of using representative national data of university staff, our study is limited to Finland. However, we believe that the study’s results can be relevant for understanding online harassment in other countries as well. At the minimum, previous cross-national research has indicated similar phenomena in different contexts (Keipi et al., 2017; Reichelmann et al., 2020; Wachs et al., 2021a, b; Zych et al., 2021). The first part of our study was based on cross-sectional data, and future studies should look into the possibilities of using longitudinal data when investigating the potential effects of online harassment. The second part of our analysis had the advantage of using an experimental design, which has not been employed much in previous investigations of online harassment. Our experiment itself was successful, and we were able to confirm part of our preregistered hypotheses. The effect sizes ranged from small to medium, which should be noted.

There is a need for more research on online victimization in the field of higher education studies in general. The problem is growing and global. Cross-national investigations would be an important future avenue. Moreover, there is a need for more studies using an experimental approach to understand how people behave in online harassment situations. Our experiment on reactions to death threats provides an excellent starting point for such studies, but future experimental studies could consider reactions toward other types of online offences. Overall, there is a need for studies using a longitudinal research design in this area. We believe that it is important to find suitable interventions to tackle the phenomenon, and possible interventions should therefore be investigated.

Conclusions

Online harassment is a growing and persistent problem. Our study, based on nationally representative data of university staff in Finland, revealed that 30% of the participants experienced online harassment during the prior 6 months. Presence in both traditional media and social media were major risk factors for victimization. Victimization was associated with higher psychological distress, lower trust, and lower perceived social support. Victims who were targeted by other members of their university community reported higher PTSD symptoms than other victims. The results of our preregistered experiment showed that participants had stronger reactions to a hypothetical death threat to a close colleague than to an unknown person from the same research field. Overall, our study indicated that the problem of online harassment is highly prevalent. Very few victims reported the assaults to supervisors or police, which is concerning. Also, our study suggested that bystanders of online harassment might be passive online unless the victim belongs to the same in-group. There is an increasing need for organizational, societal, and legislative measures to overcome the problem of online harassment.

Appendix 1

Appendix 2. Countermeasures asked from the participants of the experiment

  1. Block the person on social media.

  2. Contact the person personally and ask him/her to stop the harassment.

  3. Send a revengeful response.

  4. Turn to counseling.

  5. Avoid going outside alone when it is dark.

  6. Reduce public appearances and participation in public discussions.

  7. Change the way he/she talks about his/her work.

  8. Think about changing the subject matter of his/her work.

  9. Think about transferring to another position or to another field.

  10. Report the offence to the police.

Author contribution

Atte Oksanen: Conceptualization, data curation, investigation, methodology, formal analysis, resources, writing – original draft, writing review and editing, supervision, and funding acquisition.

Magdalena Celuch: Conceptualization, investigation, writing – original draft, and writing review and editing.

Rita Latikka: Conceptualization, data curation, investigation, writing – original draft, and writing review and editing.

Reetta Oksa: Conceptualization, data curation, investigation, writing – original draft, and writing review and editing.

Nina Savela: Conceptualization, data curation, methodology, investigation, writing – original draft, and writing review and editing.

Funding

This research received funding from the Helsingin Sanomat Foundation (Hate and Public Sphere Project 2020–2022, principal investigators Atte Oksanen & Päivi Korpisaari).

Data availability

Data is available from the corresponding author with a reasonable request. After the research project, data will be made publicly available in the Finnish Social Science Data Archive (https://www.fsd.tuni.fi/en/).

Code availability

Data were analyzed with Stata 16 software. All syntax is available from the corresponding author with a reasonable request.

Declarations

Ethics approval

The ethics committee of Tampere region in Finland declared in a 2020 statement that the study does not include any ethical issues (Statement 17/2020).

Consent to participate

Informed consent was obtained from all individual participants included in the study.

Consent for publication

Authors declare that they participated in the study and development of the manuscript. All the authors read the final version of article and gave their consent for article to be published in Higher Education.

Conflict of interest

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  1. Abrams, D., & Hogg, M. A. (2006). Social identifications: A social psychology of intergroup relations and group processes. Routledge.
  2. Álvarez-García, D., Núñez, J.C., González-Castro, P., Rodríguez, C. & Cerezo, R. (2019). The effect of parental control on cyber-victimization in adolescence: The mediating role of impulsivity and high-risk behaviors. Frontiers in Psychology, 10, article 1159. 10.3389/fpsyg.2019.01159. [DOI] [PMC free article] [PubMed]
  3. Barlow C, Awan I. “You need to be sorted out with a knife”: The attempted online silencing of women and people of Muslim faith within academia. Social Media Society. 2016;2(4):1–11. doi: 10.1177/2056305116678896. [DOI] [Google Scholar]
  4. Blizard LM. Faculty members’ experiences of cyberbullying by students at one Canadian university: Impact and recommendations. International Research in Higher Education. 2016;1(1):107–124. doi: 10.5430/irhe.v1n1p107. [DOI] [Google Scholar]
  5. Bossler AM, Holt TJ. The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice. 2010;38:227–236. doi: 10.1016/j.jcrimjus.2010.03.001. [DOI] [Google Scholar]
  6. Bocij P, McFarlane L. Cyberstalking: The technology of hate. The Police Journal. 2003;76(3):204–221. doi: 10.1350/pojo.76.3.204.19442. [DOI] [Google Scholar]
  7. Botha, J., & Pieterse, H. (2020). Fake news and deepfakes: A dangerous threat for 21st century information security. In International conference on cyber warfare and security, 57–66. Academic Conferences International Limited.
  8. Brewin CR, Rose S, Andrews B, Green J, Tata P, McEvedy C, Turner S, Foa EB. Brief screening instrument for post-traumatic stress disorder. The British Journal of Psychiatry. 2002;181(2):158–162. doi: 10.1192/bjp.181.2.158. [DOI] [PubMed] [Google Scholar]
  9. Brown R. Social identity theory: Past achievements, current problems and future challenges. European Journal of Social Psychology. 2000;30(6):745–778. doi: 10.1002/1099-0992(200011/12)30:6&#x0003c;745::AID-EJSP24&#x0003e;3.0.CO;2-O. [DOI] [Google Scholar]
  10. Cassidy W, Jackson M, Faucher C. Gender differences and cyberbullying toward faculty members in higher education. In: Navarro R, Yubero S, Larrañaga E, editors. Cyberbullying across the globe. Springer Cham; 2016. pp. 79–98. [Google Scholar]
  11. Cassidy, W., Faucher, C., & Jackson, M. (2017). Adversity in university: Cyberbullying and its impacts on students, faculty and administrators. International Journal of Environmental Research and Public Health, 14(8), article 888. 10.3390/ijerph14080888. [DOI] [PMC free article] [PubMed]
  12. Choi KS, Lee JR. Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. Computers in Human Behavior. 2017;73:394–402. doi: 10.1016/j.chb.2017.03.061. [DOI] [Google Scholar]
  13. Cikara M, Bruneau EG, Saxe RR. Us and them: Intergroup failures of empathy. Current Directions in Psychological Science. 2011;20(3):149–153. doi: 10.1177/0963721411408713. [DOI] [Google Scholar]
  14. Cohen LE, Felson M. Social change and crime rate trends: A routine activity approach. American Sociological Review. 1979;44(4):588–608. doi: 10.2307/2094589. [DOI] [Google Scholar]
  15. Costello M, Rukus J, Hawdon J. We don’t like your type around here: Regional and residential differences in exposure to online hate material targeting sexuality. Deviant Behavior. 2019;40(3):385–401. doi: 10.1080/01639625.2018.1426266. [DOI] [Google Scholar]
  16. Coyne I, Farley S, Axtell A, Sprigg C, Best L, Kwok O. Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A dysempowerment approach. The International Journal of Human Resource Management. 2017;28(7):945–972. doi: 10.1080/09585192.2015.1116454. [DOI] [Google Scholar]
  17. Coyne I, Gopaul AM, Campbell M, Pankász A, Garland R, Cousans F. Bystander responses to bullying at work: The role of mode, type and relationship to target. Journal of Business Ethics. 2019;157(3):813–827. doi: 10.1007/s10551-017-3692-2. [DOI] [Google Scholar]
  18. D'Cruz P, Noronha E. Navigating the extended reach: Target experiences of cyberbullying at work. Information and Organization. 2013;23(4):324–343. doi: 10.1016/j.infoandorg.2013.09.001. [DOI] [Google Scholar]
  19. Davies SR. Research staff and public engagement: A UK study. Higher Education. 2013;66:725–739. doi: 10.1007/s10734-013-9631-y. [DOI] [Google Scholar]
  20. Delhey J, Newton K. Predicting cross-national levels of social trust: Global pattern or Nordic exceptionalism? European Sociological Review. 2005;21(4):311–327. doi: 10.1093/esr/jci022. [DOI] [Google Scholar]
  21. DeSouza ER. Frequency rates and correlates of contrapower harassment in higher education. Journal of Interpersonal Violence. 2011;26(1):158–188. doi: 10.1177/0886260510362878. [DOI] [PubMed] [Google Scholar]
  22. Dickter CL. Confronting hate: Heterosexuals’ responses to anti-gay comments. Journal of Homosexuality. 2012;59(8):1113–1130. doi: 10.1080/00918369.2012.712817. [DOI] [PubMed] [Google Scholar]
  23. Digman JM. Personality structure: Emergence of the five-factor model. Annual Review of Psychology. 1990;41(1):417–440. doi: 10.1146/annurev.ps.41.020190.002221. [DOI] [Google Scholar]
  24. Durkin K, Patterson D. Cyberbullying, cyberharassing, and cyberstalking. In: Bryant CD, editor. Routledge handbook of deviant behavior. Routledge; 2012. pp. 468–473. [Google Scholar]
  25. Dyson B, Vickers K, Turtle J, Cowan S, Tassone A. Evaluating the use of Facebook to increase student engagement and understanding in lecture-based classes. Higher Education. 2015;69:303–313. doi: 10.1007/s10734-014-9776-3. [DOI] [Google Scholar]
  26. ElSherief, M., Nilizadeh, S., Nguyen, D., Vigna, G., & Belding, E. (2018). Peer to peer hate: Hate speech instigators and their targets. Proceedings of the International AAAI Conference on Web and Social Media, 12(1), 52–61.https://ojs.aaai.org/index.php/ICWSM/article/view/15038.
  27. Erreygers S, Pabian S, Vandebosch H, Baillien E. Helping behavior among adolescent bystanders of cyberbullying: The role of impulsivity. Learning and Individual Differences. 2016;48:61–67. doi: 10.1016/j.lindif.2016.03.003. [DOI] [Google Scholar]
  28. European Commission (2020). Regulation of the European parliament and of the council on a single market for digital services (Digital Services Act) and amending Directive 2000/31/EC. European Commission. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52020PC0825.
  29. Eysenck SBG, Eysenck HJ. Impulsiveness and venturesomeness: Their position in a dimensional system of personality description. Psychological Reports. 1978;43(3):1247–1255. doi: 10.2466/pr0.1978.43.3f.1247. [DOI] [PubMed] [Google Scholar]
  30. Fanti KA, Demetriou AG, Hawa VV. A longitudinal study of cyberbullying: Examining risk and protective factors. The European Journal of Developmental Psychology. 2012;9(2):168–181. doi: 10.1080/17405629.2011.643169. [DOI] [Google Scholar]
  31. Farley S., Coyne I., D’Cruz P. (2021) Cyberbullying at Work: Understanding the influence of technology. In D'Cruz P., Noronha E., Notelaers G., Rayner C. (Eds.) Concepts, approaches and methods. handbooks of workplace bullying, emotional abuse and harassment (vol 1). Springer. 10.1007/978-981-13-0134-6_8.
  32. Faucher, C., Cassidy, W., & Jackson, M. (2015). From the sandbox to the inbox: Comparing the acts, impacts, and solutions of bullying in K–12, higher education, and the workplace. Journal of Education and Training Studies, 3(6), 111–125. 10.11114/jets.v3i6.1033.
  33. Forssell R. Exploring cyberbullying and face-to-face bullying in working life–Prevalence, targets and expressions. Computers in Human Behavior. 2016;58:454–460. doi: 10.1016/j.chb.2016.01.003. [DOI] [Google Scholar]
  34. Freis SD, Gurung RA. A Facebook analysis of helping behavior in online bullying. Psychology of Popular Media Culture. 2013;2(1):11–19. doi: 10.1037/a0030239. [DOI] [Google Scholar]
  35. Giorgi G. Workplace bullying in academia creates a negative work environment. An Italian study. Employee Responsibilities and Rights Journal. 2012;24(4):261–275. doi: 10.1007/s10672-012-9193-7. [DOI] [Google Scholar]
  36. Goldberg DP, Gater R, Sartorius N, Ustun TB, Piccinelli M, Gureje O, Rutter C. The validity of two versions of the GHQ in the WHO study of mental illness in general health care. Psychological Medicine. 1997;27:191–197. doi: 10.1017/S003329179600424. [DOI] [PubMed] [Google Scholar]
  37. Gosse, C., Veletsianos, G., Hodson, J., Houlden, S., Dousay, T. A., Lowenthal, P. R., & Hall, N. (2021). The hidden costs of connectivity: Nature and effects of scholars’ online harassment. Learning, Media and Technology,1–17,. 10.1080/17439884.2021.1878218.
  38. Hahn E, Gottschling J, Spinath FM. Short measurements of personality–Validity and reliability of the GSOEP Big Five Inventory (BFI-S) Journal of Research in Personality. 2012;46(3):355–359. doi: 10.1016/j.jrp.2012.03.008. [DOI] [Google Scholar]
  39. Hasson Y, Tamir M, Brahms KS, Cohrs JC, Halperin E. Are liberals and conservatives equally motivated to feel empathy toward others? Personality and Social Psychology Bulletin. 2018;44:1449–1459. doi: 10.1177/0146167218769867. [DOI] [PubMed] [Google Scholar]
  40. Hawdon J, Oksanen A, Räsänen P. Exposure to online hate in four nations: A cross-national consideration. Deviant Behavior. 2017;38(3):254–266. doi: 10.1080/01639625.2016.1196985. [DOI] [Google Scholar]
  41. Hodson, J., Gosse, C., Veletsianos, G., & Houlden, S. (2018). I get by with a little help from my friends: The ecological model and support for women scholars experiencing online harassment. First Monday, 23(8), Article 9136. 10.5210/fm.v23i8.9136.
  42. Holt TJ, Bossler AM. Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior. 2008;30(1):1–25. doi: 10.1080/01639620701876577. [DOI] [Google Scholar]
  43. Holt, T. J. and Lee, J. R. (2019). Policing cybercrime through law enforcement and industry mechanisms. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. J. Kuss (Ed.). The Oxford Handbook of Cyberpsychology (pp. 645–662). Oxford University Press. 10.1093/oxfordhb/9780198812746.013.34.
  44. Jane EA. Gendered cyberhate as workplace harassment and economic vandalism. Feminist Media Studies. 2018;18(4):575–591. doi: 10.1080/14680777.2018.1447344. [DOI] [Google Scholar]
  45. Jenaro C, Flores N, Frías CP. Systematic review of empirical studies on cyberbullying in adults: What we know and what we should investigate. Aggression and Violent Behavior. 2018;38:113–122. doi: 10.1016/j.avb.2017.12.003. [DOI] [Google Scholar]
  46. John OP, Naumann LP, Soto CJ. Paradigm shift to the integrative Big Five trait taxonomy: History, measurement, and conceptual issues. In: John OP, Robins RW, Pervin LA, editors. Handbook of personality: Theory and research. Guilford Press; 2008. pp. 114–158. [Google Scholar]
  47. Kavanagh E, Brown L. Toward a research agenda for examining online gender-based violence against women academics. Journal of Further and Higher Education. 2020;44(10):1379–1387. doi: 10.1080/0309877X.2019.1688267. [DOI] [Google Scholar]
  48. Keashly L, Neuman JH. Faculty experiences with bullying in higher education: Causes, consequences, and management. Administrative Theory & Praxis. 2010;32(1):48–70. doi: 10.2753/ATP1084-1806320103. [DOI] [Google Scholar]
  49. Keipi T, Näsi M, Oksanen A, Räsänen P. Online hate and harmful content. Routledge; 2017. [Google Scholar]
  50. Kokkinos CM, Antoniadou N, Markos A. Cyber-bullying: An investigation of the psychological profile of university student participants. Journal of Applied Developmental Psychology. 2014;35(3):204–214. doi: 10.1016/j.appdev.2014.04.001. [DOI] [Google Scholar]
  51. Korchmaros JD, Kenny DA. Emotional closeness as a mediator of the effect of genetic relatedness on altruism. Psychological Science. 2001;12(3):262–265. doi: 10.1111/1467-9280.00348. [DOI] [PubMed] [Google Scholar]
  52. Koziarski J, Lee JR. Connecting evidence-based policing and cybercrime. Policing: An International Journal. 2020;43(1):198–211. doi: 10.1108/PIJPSM-07-2019-0107. [DOI] [Google Scholar]
  53. Kowalski R, Giumetti G, Schroeder A, Reese H. Cyber bullying among college students: Evidence from multiple domains of college life. Cutting-Edge Technologies in Higher Education. 2012;5:293–321. doi: 10.1108/S2044-9968(2012)0000005016. [DOI] [Google Scholar]
  54. Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin. 2014;140(4):1073–1137. doi: 10.1037/a0035618. [DOI] [PubMed] [Google Scholar]
  55. Kowalski RM, Toth A, Morgan M. Bullying and cyberbullying in adulthood and the workplace. The Journal of Social Psychology. 2018;158(1):64–81. doi: 10.1080/00224545.2017.1302402. [DOI] [PubMed] [Google Scholar]
  56. Lambe LJ, Cioppa VD, Hong IK, Craig WM. Standing up to bullying: A social ecological review of peer defending in offline and online contexts. Aggression and Violent Behavior. 2019;45:51–74. doi: 10.1016/j.avb.2018.05.007. [DOI] [Google Scholar]
  57. Lazer DMJ, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F, Metzger MJ, Nyhan B, Pennycook G, Rothschild D, Schudson M, Sloman SA, Sunstein CR, Thorson EA, Watts DJ, Zittrain JL. The science of fake news. Science. 2018;359(6380):1094–1096. doi: 10.1126/science.aao2998. [DOI] [PubMed] [Google Scholar]
  58. Lee, J., & Kim, Y. (2020). When thinking of my death leads to thinking of others’ deaths: The effect of collectivism, psychological closeness, and mortality salience on prosocial behavioral intentions in the Sewol ferry disaster. Journal of Risk Research,1–15,. 10.1080/13669877.2020.1738530.
  59. Lewis R, Rowe M, Wiper C. Online abuse of feminists as an emerging form of violence against women and girls. The British Journal of Criminology. 2017;57(6):1462–1481. doi: 10.1093/bjc/azw073. [DOI] [Google Scholar]
  60. López-Larrañaga M, Orue I. Interaction among psychopathic traits in the prediction of cyberbullying behavior. Revista de Psicopatología y Psicología Clínica. 2019;24(1):1–8. doi: 10.5944/rppc.23932. [DOI] [Google Scholar]
  61. Macháčková H, Dedkova L, Sevcikova A, Cerna A. Bystanders’ support of cyberbullied schoolmates. Journal of Community & Applied Social Psychology. 2013;23(1):25–36. doi: 10.1002/casp.2135. [DOI] [Google Scholar]
  62. Machackova H, Pfetsch J. Bystanders’ responses to offline bullying and cyberbullying: The role of empathy and normative beliefs about aggression. Scandinavian Journal of Psychology. 2016;57(2):169–176. doi: 10.1111/sjop.12277. [DOI] [PubMed] [Google Scholar]
  63. Marteau TM, Bekker H. The development of a six-item short-form of the state scale of the Spielberger State—Trait Anxiety Inventory (STAI) British Journal of Clinical Psychology. 1992;31(3):301–306. doi: 10.1111/j.2044-8260.1992.tb00997.x. [DOI] [PubMed] [Google Scholar]
  64. Mikkola, M., Oksanen, A., Kaakinen, M., Miller, B. L., Savolainen, I., Sirola, A., Zych, I., & Paek, H. J. (2021). Situational and individual risk factors for cybercrime victimization in a cross-national context. International Journal of Offender Therapy and Comparative Criminology,1–19,. 10.1177/0306624X20981041. [DOI] [PubMed]
  65. Mood C. Logistic regression: Why we cannot do what we think we can do, and what we can do about it. European Sociological Review. 2010;26(1):67–82. doi: 10.1093/esr/jcp006. [DOI] [Google Scholar]
  66. Nagle J. Twitter, cyber-violence, and the need for a critical social media literacy in teacher education: A review of the literature. Teaching and Teacher Education. 2018;76:86–94. doi: 10.1016/j.tate.2018.08.014. [DOI] [Google Scholar]
  67. Näsi M, Räsänen P, Kaakinen M, Keipi T, Oksanen A. Do routine activities help predict young adults’ online harassment: A multi-nation study. Criminology & Criminal Justice. 2017;17(4):418–432. doi: 10.1177/1748895816679866. [DOI] [Google Scholar]
  68. Nedelec JL. Individual differences and co-occurring victimization online and offline: The role of impulsivity. Personality and Individual Differences. 2018;133:77–84. doi: 10.1016/j.paid.2016.11.028. [DOI] [Google Scholar]
  69. Nurse, J. R. C. (2019). Cybercrime and you: how criminals attack and the human factors that they seek to exploit. In A. Attrill-Smith, C. Fullwood, M. Keep, & D. J. Kuss (Ed.). The Oxford Handbook of Cyberpsychology (pp. 663–690). Oxford University Press. 10.1093/oxfordhb/9780198812746.013.35.
  70. Oksanen, A., Oksa, R., Savela, N., Kaakinen, M., & Ellonen, N. (2020a). Cyberbullying victimization at work: Social media identity bubble approach. Computers in Human Behavior, 109(August). 10.1016/j.chb.2020.106363.
  71. Oksanen, A., Savela, N., Oksa, R., & Latikka, R. (2020b). Influence of closeness to and similarity with the victim: A social psychological experiment on reactions to a death threat. Open Science Forum hypothesis pre-registration. https://osf.io/ae6wr.
  72. Passarelli TO, Buchanan TW. How do stress and social closeness impact prosocial behavior? Experimental Psychology. 2020;67(2):123–131. doi: 10.1027/1618-3169/a000482. [DOI] [PubMed] [Google Scholar]
  73. Peluchette JV, Karl K, Wood C, Williams J. Cyberbullying victimization: Do victims’ personality and risky social network behaviors contribute to the problem? Computers in Human Behavior. 2015;52:424–435. doi: 10.1016/j.chb.2015.06.028. [DOI] [Google Scholar]
  74. Pew Research Center. (2014). Online Harassment. https://www.pewresearch.org/internet/2014/10/22/online-harassment/.
  75. Pew Research Center. (2021). The state of online harassment. Pew Research Center. https://www.pewresearch.org/internet/2021/01/13/the-state-of-online-harassment/.
  76. Pratt TC, Turanovic JJ, Fox KA, Wright KA. Self-control and victimization: A meta-analysis. Criminology. 2014;52(1):87–116. doi: 10.1016/j.jcrimjus.2010.03.001. [DOI] [Google Scholar]
  77. Pyke KD. Institutional betrayal: Inequity, discrimination, bullying, and retaliation in academia. Sociological Perspectives. 2018;61(1):5–13. doi: 10.1177/0731121417743816. [DOI] [Google Scholar]
  78. Reichelmann, A., Hawdon, J., Costello, M., Ryan, J., Blaya, C., Llorent, V., Oksanen, A., Räsänen, P., & Zych, I. (2020). Hate knows no boundaries: Online hate in six nations. Deviant Behavior,1–12,. 10.1080/01639625.2020.1722337.
  79. Reyns BW, Henson B, Fisher BS. Being pursued online: Applying cyberlifestyle–routine activities theory to cyberstalking victimization. Criminal Justice and Behavior. 2011;38(11):1149–1169. doi: 10.1177/0093854811421448. [DOI] [Google Scholar]
  80. Robins RW, Hendin HM, Trzesniewski KH. Measuring global self-esteem: Construct validation of a single-item measure and the Rosenberg Self-Esteem Scale. Personality and Social Psychological Bulletin. 2001;27(2):151–161. doi: 10.1177/0146167201272002. [DOI] [Google Scholar]
  81. Schaufeli, W. B., & Bakker, A. B. (2004). UWES Utrecht work engagement scale. Preliminary manual [Version 1.1, December 2004]. Utrecht University: Occupational Health Psychology Unit. https://www.wilmarschaufeli.nl/publications/Schaufeli/Tests/UWES_GB_9.pdf.
  82. Sheeran N, Cummings DJ. An examination of the relationship between Facebook groups attached to university courses and student engagement. Higher Education. 2018;76:937–955. doi: 10.1007/s10734-018-0253-2. [DOI] [Google Scholar]
  83. Smith ER, Mackie DM. Dynamics of group-based emotions: Insights from intergroup emotions theory. Emotion Review. 2015;7(4):349–354. doi: 10.1177/1754073915590614. [DOI] [Google Scholar]
  84. Stevens, S. M., Jago, C. P., Jasko, K., & Heyman, G. D. (2020). Trustworthiness and ideological similarity (but not ideology) promote empathy. Personality and Social Psychology Bulletin,1–14,. 10.1177/0146167220972245. [DOI] [PubMed]
  85. Tabachnick, B. G., & Fidell, L. S. (2013). Using multivariate statistics (6th edn). Pearson.
  86. Tajfel H, Turner JC. An integrative theory of intergroup conflict. In: Austin WG, Worchel S, editors. The social psychology of intergroup relations. Brooks/Cole; 1979. pp. 33–47. [Google Scholar]
  87. Turner JC, Brown RJ, Tajfel H. Social comparison and group interest in ingroup favouritism. European Journal of Social Psychology. 1979;9(2):187–204. doi: 10.1002/ejsp.2420090207. [DOI] [Google Scholar]
  88. Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., & Wetherell, M. S. (1987). Rediscovering the social group: A self-categorization theory. Basil Blackwell.
  89. Uslaner EM. The moral foundations of trust. Cambridge University Press; 2002. [Google Scholar]
  90. Van Cleemput K, Vandebosch H, Pabian S. Personal characteristics and contextual factors that determine “helping”, “joining in”, and “doing nothing” when witnessing cyberbullying. Aggressive Behavior. 2014;40(5):383–396. doi: 10.1002/ab.21534. [DOI] [PubMed] [Google Scholar]
  91. Van der Linden S, Panagopoulos C, Roozenbeek J. You are fake news: Political bias in perceptions of fake news. Media, Culture & Society. 2020;42(3):460–470. doi: 10.1177/0163443720906992. [DOI] [Google Scholar]
  92. Vanman EJ. The role of empathy in intergroup relations. Current Opinion in Psychology. 2016;11:59–63. doi: 10.1016/j.copsyc.2016.06.007. [DOI] [Google Scholar]
  93. Vazsonyi AT, Macháčková H, Sevcikova A, Smahel D, Cerna A. Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries. European Journal of Developmental Psychology. 2012;9(2):210–227. doi: 10.1080/17405629.2011.644919. [DOI] [Google Scholar]
  94. Veletsianos G, Houlden S, Hodson J, Gosse C. Women scholars’ experiences with online harassment and abuse: Self-protection, resistance, acceptance, and self-blame. New Media & Society. 2018;20(12):4689–4708. doi: 10.1177/1461444818781324. [DOI] [Google Scholar]
  95. Wachs, S., Costello, M., Wright, M.F., Flora, K., Daskalou, V., Maziridou, E., Kwon, Y., Na, E-Y., Sittichai, R. Biswal, R., Singh, R., Almendros, C., Gámez-Guadix, M., Görzig, A., & Hong, J.S. (2021a). “DNT LET’EM H8 U!”: Applying the routine activity framework to understand cyberhate victimization among adolescents across eight countries. Computers & Education, 160, Article 104026. 10.1016/j.compedu.2020.104026.
  96. Wachs, S., Mazzone, A., Milosevic, T., Wright, M. F., Blaya, C., Gámez-Guadix, M., & Norman, J. O. H. (2021b). Online correlates of cyberhate involvement among young people from ten European countries: An application of the Routine Activity and Problem Behaviour Theory. Computers in Human Behavior, 123, Article 106872. 10.1016/j.chb.2021.106872.
  97. Watermeyer R, Crick T, Knight C, Goodall J. COVID-19 and digital disruption in UK universities: Afflictions and affordances of emergency online migration. Higher Education. 2021;81:623–641. doi: 10.1007/s10734-020-00561-y. [DOI] [PMC free article] [PubMed] [Google Scholar]
  98. Waternaux CM. Asymptotic distribution of the sample roots for a nonnormal population. Biometrika. 1976;63(3):639–645. doi: 10.1093/biomet/63.3.639. [DOI] [Google Scholar]
  99. Williams ML. Guardians upon high: An application of routine activities theory to online identity theft in Europe at the country and individual level. British Journal of Criminology. 2016;56(1):21–48. doi: 10.1093/bjc/azv011. [DOI] [Google Scholar]
  100. Williams, M. (2021). The science of hate: How prejudice becomes hate and what we can do to stop it. Faber & Faber.
  101. Yan W, Zhang Y. User behaviors and network characteristics of US research universities on an academic social networking site. Higher Education. 2019;78:221–240. doi: 10.1007/s10734-018-0339-x. [DOI] [Google Scholar]
  102. Yelin, H., & Clancy, L. (2020). Doing impact work while female: Hate tweets, ‘hot potatoes’ and having ‘enough of experts.’ European Journal of Women’s Studies,1–19,. 10.1177/1350506820910194.
  103. Zych I, Ortega-Ruiz R, Del Rey R. Systematic review of theoretical studies on bullying and cyberbullying: Facts, knowledge, prevention, and intervention. Aggression and Violent Behavior. 2015;23:1–21. doi: 10.1016/j.avb.2015.10.001. [DOI] [Google Scholar]
  104. Zych, I., Kaakinen, M., Savolainen, I., Sirola, A., Paek, H-J., & Oksanen, A. (2021). The role of impulsivity, social relations online and offline and compulsive Internet use in cyberaggression: A four-country study. New Media & Society. 10.1177/14614447211009459.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Data is available from the corresponding author with a reasonable request. After the research project, data will be made publicly available in the Finnish Social Science Data Archive (https://www.fsd.tuni.fi/en/).

Data were analyzed with Stata 16 software. All syntax is available from the corresponding author with a reasonable request.


Articles from Higher Education are provided here courtesy of Nature Publishing Group

RESOURCES