Skip to main content
PLOS ONE logoLink to PLOS ONE
. 2022 Jul 19;17(7):e0268838. doi: 10.1371/journal.pone.0268838

How many cyberbullying(s)? A non-unitary perspective for offensive online behaviours

Stefano Guidi 1,*, Paola Palmitesta 1, Margherita Bracci 1, Enrica Marchigiani 1, Ileana Di Pomponio 1, Oronzo Parlangeli 1
Editor: Sergio A Useche2
PMCID: PMC9295961  PMID: 35853008

Abstract

Research has usually considered cyberbullying as a unitary phenomenon. Thus, it has been neglected to explore whether the specific online aggressive behaviours relate differentially to demographic features of the perpetrators of online aggressive actions, their personality characteristics, or to the ways in which they interact with the Internet. To bridge this gap, a study was conducted through a questionnaire administered online to 1228 Italian high-school students (Female: 61.1%; 14–15 yo: 48.%; 16–17 yo: 29.1%; 18–20 yo: 20.4%, 21–25 yo: 1.6%; Northern Italy: 4.1%; Central Italy: 59.2%; Southern Italy: 36.4%). The questionnaire, in addition to items about the use of social media, mechanisms of Moral Disengagement and personality characteristics of the participants in the study, also included a scale for the measurement of cyberbullying through the reference to six aggressive behaviours. The results indicate that cyberbullying can be considered as a non-unitary phenomenon in which the different aggressive behaviours can be related to different individual characteristics such as gender, personality traits and the different ways of interacting with social media. Moreover, the existence of two components of cyberbullying has been highlighted, one related to virtual offensive actions directly aimed at a victim, the other to indirect actions, more likely conducted involving bystanders. These findings open important perspectives for understanding, preventing, and mitigating cyberbullying among adolescents.

Introduction

Social media and the Internet are today the prevailing means of communication among adolescents and young adults. While online communication media provide many opportunities, their use also exposes individuals to the risk of being victims of aggressive behaviours and misconduct. A single action such as posting an embarrassing photo or video of someone on a social network is enough for this to be seen by many people many times [14], with potential negative consequences for the victim, such as low self-esteem, distress, depression, loneliness, sadness [58]. Such negative consequences may be even worrisome. A meta-analysis of 47 studies found that bullying victimization and bullying perpetration may be associated with suicidal ideation and behaviour [9].

A very recent review on cyberbullying among adolescents and children, based on 63 references [10], reported that the prevalence of cyberbullying perpetration varied across studies from 6.0% to 46.3%, while the rates of cyberbullying victimization from 14.0% to 57.5%. Other authors [3, 1113] underline that about 20–40% of adolescents are harassed online. These numbers have been constantly on the rise [14, 15], and the number of studies aimed at analysing cyberbullying has increased as well. In a recent analysis, it was highlighted that since 2011/2012 there has been a linear increase in scientific articles on cyberbullying each year, reaching 268 publications in 2019 [15].

In this regard, several reviews have already been produced [3, 4, 1618] that showed how research has essentially focused on some fundamental aspects related to cyberbullying, and that there are still many open issues.

First, we can note some difficulties in the definition of the phenomenon [19], though some common characteristics of cyberbullying behaviours have been highlighted so far. In generally accepted definitions, cyberbullying has several key characteristics: it is a behaviour intended to hurt, it is enacted by one or more people, it is performed through an electronic medium, and it is directed at those who cannot easily defend themselves [2]. According to [20], cyberbullying should be distinguished from cyber incivility and cyber aggression. The former one, in fact, does not involve an imbalance of power, and should refer to any rude or rough behaviour carried out through electronic means. Cyber aggression, on the other hand, refers to those behaviours aimed at hurting, causing injury, and like cyber victimization does not involve an imbalance of power [21]. Cyberbullying thus appears to be based essentially on an abuse of power [22, 23] that is manifested by behaviours that are systematically aimed at causing harm and that are carried out using electronic means [2].

However, definitions can be different depending on one’s point of view, and acting like a bully can mean different things to different people. For example, in a study conducted on a UK sample, O’Brien [24] showed that teachers tend to qualify as bullying a higher number of behaviours, on the basis of factors such as the way the behaviour affects the victim, gender discrimination, besides power relations between the aggressor and the victim.

Above all, there are two aspects in the attempts to define the peculiarities of cyberbullying that are rather opaque, as pointed out by Slonje et al. [4]. The first has to do with the issue of repetition of behaviour. The Internet, in fact, can be a powerful amplifier and booster of any word or action. And so even the one-time offense can become "endless." The other aspect has to do with determining what might contribute to an imbalance of power between aggressor and victim. As argued by Vandebosch & van Cleemput [25], this may also relate to greater technological experience or to the ability to behave anonymously. Moreover, a meta-analysis of 22 studies, has shown that often the role of the victim and the role of the bully can involve the same person, and the occurrence of this condition may depend on the culture of reference, i.e. Central European, Mediterranean, North American, South American and Asian cultures [26].

It seems interesting to highlight that, recently, several studies have been trying to refine algorithms with the aim of detecting offensive behaviour in different social media [2729]. These studies are often based on the results provided by the psychological analysis of recent years, thus confirming the role of personality factors [28, 30]. They also contribute to better define what cyberbullying is and detect it more readily, for instance by capturing repetitive behaviour and sentiment information [31, 32]. To date, however, these studies are often based on datasets collected from a single or few social media [28, 30, 32, 33], and they do not always consider all the different offensive behaviours, such as those concerning ethnicity, religion, physical and cognitive impairments [30].

Because of these blurry aspects, it seems really difficult to clearly qualify what cyberbullying is and to distinguish it from other forms of virtual aggressions.

Variables associated with cyberbullying

Even when we consider the subjective variables, the results are not always homogeneous. Above all, with respect to gender and age, the studies do not show consistent data, although the trend seems to indicate a greater harassment towards girls, with a peak for bullying behaviour between the ages of 12 and 15 [2, 3436] (for a recent review of studies on the subject see [10]). Tokunaga [3] suggested a curvilinear trend with a peak that can be identified between 7th and 8th grades, while Barlett & Coyne [37], by directly analysing the relationships between gender and age, showed an interesting relationship between these two variables. Generally, it is boys who are more involved in offending behaviours. However, this difference between the sexes in the likelihood to engage in offensive behaviour seems to become evident only as boys get older.

Another key factor for predicting aggressive behaviour on the net is given by the time spent on it, which, if excessive, is often associated with psychological distress. A meta-analysis showed a correlation between a problematic use of the Internet and depression, though this effect is essentially associated with male gender [38] Moreover, some scholars found a correlation among aggressive virtual behaviour, a greater experience in the use of communication technologies and time spent online [3942]. At the same time when social media—the communication means that are most involved in acts of cyberbullying—are taken into account, they do not seem to have a direct link to misconduct; though the use of social media that most easily allow behaviours in anonymity seems more connected to the occurrence of offensive behaviours [13]. However, intensive use of social media seems more clearly to be a risk factor for the victim more than for the perpetrator [39].

Several studies have also focused on the personality characteristics of bullies (see, for instance [43]). Among the most investigated aspects are those related to personality traits in reference to the theory of the big five [44]. In an analysis aimed at distinguishing bullying from cyberbullying [45], it was found that, unlike so-called traditional bullying, cyberbullying is essentially negatively related to the trait of agreeableness. This finding has emerged also in other studies in which, however, cyberbullying was also found to be negatively related to conscientiousness [42] and to affective empathy [46]. Recently, a study attempted to relate the personality characteristics of Twitter users to their offensive messages [47]. Using an automated categorization of both personality characteristics and user behaviours, it was highlighted that extraversion, agreeableness, and neuroticism are highly relevant predictors (up to 96% accurate) for identifying those Twitter users who can be qualified as bullies.

More specifically, personality characteristics have been related to Moral Disengagement, that is those thought mechanisms that are exercised to diminish the sanctioning aspects of moral principles [4850]. In essence, moral disengagement mechanisms are justifications for one’s thoughts or actions that are made acceptable by referring to moral principles that are considered at a higher level, such as when sacrificing an individual for the collective interest or punishing those who are thought to deserve punishment. It has been previously reported that subjects who self-report having engaged in cyberbullying differ from those who have never done so for a greater reliance on all moral disengagement mechanisms [13]. This finding had already emerged in a previous study by Meter & Bauman [51], who found that moral disengagement is related as much to cyberbullying as it is to traditional bullying. Again, however, the relationships between moral disengagement and cyberbullying are not fully defined. The use of moral disengagement mechanisms in the context of online relationships can be particularly variable, and thus quite different from those involved in bullying perpetrated in non-virtual contexts. In fact, while traditional bullying seems to be context independent, the same appears not to be true for cyberbullying [52]. From the results of the analysis conducted by Paciello and colleagues [52], the possibility emerges that online moral disengagement should be formulated and studied as a theoretical construct separate from the one which manifests in traditional contexts, although the two constructs stand out as related.

Measuring cyberbullying

Another issue related to the understanding, definition and prevention of cyberbullying refers directly to the instruments commonly used to measure its occurrence. According to many studies the different manifestations of bullying, such as cyberbullying, are better explained as indicators of a unidimensional construct [5356]. In fact, the many instruments used and proposed in the literature generally involve the use of a variable number of items that, with ordinal, interval, or ratio response scales [57] aim to uniquely qualify the experience of cyberbullying. In 2014, an analysis conducted to evaluate self-report instruments in reference to cyberbullying [58] showed that many scales were already available. More precisely, 27 scales were identified, although not all of them at an adequate level of development and with satisfactory validity and reliability indices. Today it can be said that there are scales with a long tradition such as the revised version of the Olweus Bully-Victim Questionnaire [59], the Peer Relations Questionnaire [60], and the Forms of Bullying Scale [55]. And it was from these three scales that Thomas and colleagues [57] validated a scale that allowed them to assert that the construct of cyberbullying is essentially one-dimensional (see also [61]). Despite this result, however, assumptions can be made in relation to the fact that the results obtained are evidently determined by the behaviours included in the scale which may be more or less similar to each other.

In a recent review of tools used for measuring cyberbullying Chun et al. [62] highlighted that of the 64 studies considered, only 15 followed a correct approach to scale construction with respect to item selection. Furthermore, only 1 of these had subscales to assess perpetration-only cyberbullying. This is the 19 items scale proposed by Álvarez-García et al. [34] inspired directly by the multifactorial model proposed by Palladino et al. [63]. In these and a few other cases (see [64]), an attempt was made to structure scales that would account for the different behavioural facets of cyberbullying through an appropriate number of items. Factor analyses conducted on the data identified some factors (two to four) that could provide a finer understanding of the phenomenon. These studies, however, have not attempted to account for both the various subjective (e.g. personality factors) or contextual factors (e.g., the possibility to have frequent interactions on the Internet) that are likely to be involved in motivating the different manifestations of online aggressive behaviours.

Other scales, such as the one used by Meter & Bauman [51] were created with an intent that clearly aims at brevity. This tool presents only 6 items for behaviours that describe typical cyberbullying actions by different means, which are paralleled with as many items on cyber-victimization. Specifically, those misconducts have to do with verbal aggressiveness, sending nasty messages, revealing secrets, spreading gossip, visual aggressiveness, and impersonation. Usually these items are analysed in a unified manner, for example as the authors did in reference to moral disengagement [51]. However, an analysis that attempts to relate the different behaviours to different subject characteristics could be informative at a more fine-grained level. Therefore, it seems reasonable to try to analyse whether the different cyberbullying behaviours described within the same scale could be predicted by different subjective and contextual-behavioural variables. This could lead to a more clearly referable understanding of the phenomenon in its different manifestations.

The study

The aim of the study was to investigate different forms of cyberbullying involving the use of social media and the internet by adolescents, to understand their determinants with respect to individual psychological variables and to explore associations with demographic variables and variables related to the pattern of social networks use.

Four different research questions (RQ) were addressed in the study:

  1. RQ1. Are there differences in the frequency of different types of cyberbullying behaviours, overall and as a function of socio-demographic variables? We might expect that different forms of aggressive behaviour have different frequencies (H1) while it is not clear whether differences in cyberbullying frequency across categories such as gender (i.e. more frequently reported by boys) or age should be found [37] for all the different behaviours (H2) or not.

  2. RQ2. Are different types of cyberbullying behaviours differently related to individual features such as personality traits and moral disengagement? It is known from several studies [13, 51, 52] that cyberbullying is more common in adolescents who exhibit certain characteristics such as a high level of moral disengagement, and some personality characteristics as neuroticism. Escortell and colleagues [65] found a relationship among online aggressors and a minor level of agreeableness and conscientiousness and major level of neuroticism, while it has been observed that agreeableness and openness to experience are [66, 67] a key factor to be a victim. Although there is no general consensus among the findings on this issue, we can suppose a relationship between specific forms of aggressive behaviour and personality, cognitive and behavioural factors (H3).

  3. RQ3. Are different types of cyberbullying behaviours specifically related to different profiles of internet and social media usage? Previous research has shown that aggressive behaviour on the internet is related to the time spent online and using social media [68], but it is not clear whether this association can be found for cyberbullying in general or whether it is specific to certain forms of misconduct only (H4). The latter assumption can be made if we take a multidimensional perspective of cyberbullying. Moreover, with few exceptions [13], factors such as the number of accounts or followers on social networks have not been adequately studied in relation to cyberbullying.

  4. RQ4. Is cyberbullying better conceived and measured as a unitary construct or as a multidimensional construct? It is possible that inconsistencies among findings about the association of aggressive behaviours online and demographic or individual variables might be due to differences in the measures of cyberbullying used in the studies. We hypothesise that even investigating a small number of behaviours, as in the case of Meter & Bauman’s scale [51], non-unified perspectives of cyberbullying may emerge (H5).

To address these research questions, and test the various hypotheses described above, we structured a questionnaire that was administered to a large sample of high school students.

Materials and methods

Participants and procedure

One thousand two hundred and twenty-eight (1228) students from high-schools, technical and professional schools, participated in the study. The majority were girls (61.1%), and half of the participants were in the 14–15 age range (48.4%), followed by the 16–17 age range (28.7%) and by 18–20 years (20.2%). Only 19 students belonged to the 21–25 age range (1.5%). Demographic information about participants in the sample are presented in Table 1.

Table 1. Socio-demographic characteristics of the sample.

Variable N %
Gender NA = 2
    Female 750 61.2%
    Male 476 38.8%
Age NA = 14
    14–15 years 594 48.9%
    16–17 years 353 29.1%
    18–20 years 248 20.4%
    21–25 years 19 1.6%
Geographical region a
    Northern Italy 50 4.1%
    Central Italy 723 58.9%
    Southern Italy and Islands 445 36.2%

Descriptive statistics (frequencies) about the socio-demographic characteristics of the sample (N = 1.228).

aRegions in Northern Italy: Trentino Alto-Adige, Lombardia, Valle d’Aosta, Piemonte; Regions in Central Italy: Tuscany, Lazio; Regions in Southern Italy: Campania, Sicilia.

The schools were distributed across the Italian country (Northern Italy: 4.1%; Central Italy: 59.2%; Southern Italy: 36.4%) and were chosen via personal contacts of a small group of university students who served as research assistants in the study and that attended those schools before enrolling to college. The headmasters of the schools were contacted and informed about the study. The parents of minors were also contacted through the school and asked to give consent to the participation of their child to the study. After having received their authorization, students were asked to complete a self-reported on-line questionnaire on a voluntary basis. The ethical aspects of the study were approved by the department, acting as Ethical Committee, in March 2019 (report n. 10/2019 of 13 March 2019). The different schools involved were all contacted at different times during 2019, and data collection ended in December 2019.

Materials and measures

The questionnaire included 32 questions, and was structured into 5 sections, dedicated to collect, respectively, socio-demographic information about participants, information on their patterns of social media use, their personality traits [69], the levels of moral disengagement about cyberbullying [51] and the frequency of cyberbullying behaviours [51].

In the first section participants were asked to report their gender, their age, the city in which they lived, and the type of secondary school they were attending.

The use of social networks was investigated in the second section through multiple choice questions on the most frequently used social media (Youtube, Instagram, Snapchat, Google+, Whatsapp, Twitter, Facebook, etc), and the time spent online every day (“never”; “less than 1 hour”; “1 to 3 hours”; “more than 3 hours”). Feelings related to network use—such as jitters if unable to use the Internet were also inquired (“If I can’t use Internet I feel nervous”) were measured on a five-point agreement scale (1 = strongly disagree / 5 = strongly agree). Also the number of social profiles were investigated (“None”; “One”; “More than one”) as well as the number of followers of each participant (“Less than 200 followers”, “More than 200 to 500”, “More than 500 to 1000”, “More than 1000 to 5000”, “More than 5000 followers”).

The last three sections of the questionnaire, as detailed in the following paragraphs, included the Italian version of three scales aimed at measuring personality traits [70], moral disengagement about cyberbullying and cyberbullying behaviours [50, 51] respectively.

Big Five Inventory (BFI)

Personality was measured using the Italian version of the Big Five Inventory-10 [69, 70], a very brief scale comprising only 10 items, which measures the five personality traits from the Big Five model: Agreeableness, Extraversion, Conscientiousness, Emotional Stability, and Openness to Experience. Responses for all the items are expressed on a 5-point agreement scale (1 = strongly disagree and 5 = strongly agree), and each trait is measured by two items, with one item for each scale reverse coded. Despite its brevity, this instrument has shown good psychometrics properties in the validation study [70].

Moral disengagement about cyberbullying

Moral Disengagement about cyberbullying was measured using the Italian version of a self-report scale proposed by Meter and Bauman [51] and including eight items. Each item refers to a different type of cyberbullying behaviour, for example “Cyberbullying annoying classmates is just teaching them a lesson” or “It’s okay to treat someone badly if they behave like a jerk”, and responses are expressed on a 5-point agreement scale, where 1 corresponds to “strongly disagree” and 5 to “strongly agree”. The scores are then averaged across items to get a summary measure of the level of moral disengagement. The items had been translated in Italian by the authors for a previous study [68] in which a confirmatory factor analysis had shown excellent fit and prediction validity.

Cyberbullying

Cyberbullying perpetration was measured using the Italian version of a self-report scale devised by Meter and Bauman [51], which includes 6 items, each referring to a different type of online aggressive behaviour directed against someone: 1) “Sending a mean or nasty text message”2) “Sending mean or nasty email messages”; 3) “Sending an embarrassing photo of someone via cell phone”, 4) “Pretended to be someone else on the Internet”; 5) “Revealing someone else’s secrets online or by cell phone without their permission”; 6) “Spreading a rumour about someone on the Internet”. For each behaviour, participants were asked to report how often they had carried it out, on a 4-point frequency scale ranging from never to more than five times (1 = never; 2 = 1–2 times; 3 = 3–5 times; 4 = 5+ times). The items had been translated in Italian by the authors for a previous study [68] in which a confirmatory factor analysis had shown excellent fit.

The full questionnaire used in the study is available in S1 Text.

Statistical analysis

Descriptive statistics (means and standard deviations for numeric variables, and frequency tables for categorical ones) were computed to characterise the composition of the sample with respect to socio-demographic features, personality characteristics of respondents, social network use, moral disengagement about cyberbullying and perpetration of cyberbullying acts. Chi-squared tests were used to compare frequency distributions across gender and age, and t-tests to compare the means of numerical variables across genders.

Pearson product-moment correlations between personality factors, aggressive behaviours and moral disengagement about cyberbullying were computed to understand the possible relationships between these variables. Holm’s method was used to adjust p-values for multiple comparisons.

Ordinal logistic regression models were used to investigate predictors of the self-reported frequency of the different cyberbullying behaviours, measured on an ordinal scale with 4 levels (“never”, “1 to 2 times”, “3 to 5 times”, “more than 5 times”). For each behaviour, a separate regression model was used, using ratings of the self-reported frequency of perpetration as dependent variable. Predictors included in all the models were: age, gender, the five personality factors, the negative feelings when they do not have access to the internet, the time spent on social media, the number of social profiles and moral disengagement scores. All the numerical predictors were centred on the mean. For ordinal and nominal predictors were used treatment coding, and the reference categories for the categorical variables were chosen in the following way. Gender was coded so that it was 0 for “female”, and 1 for “male”. For age, the smaller age class was used as the reference category. For the number of followers and the time on social networks, which both had 3 levels, the middle category was chosen as the reference (“200–500 followers”, “1–3 h/d on social networks”), while the number of social network accounts was coded as 0 for those with only one account, and 1 for those with more than one account. Internet addiction, which was measured on a 5-point scale, was treated as a numerical variable, and centred on the mean. All the predictors were entered simultaneously in the regression models. Participants who had reported to never use social networks, were excluded from the regression analyses.

To analyse the factorial structure of the measurement of cyberbullying we have used a combination of Exploratory and Confirmatory Factor Analysis, conducted respectively on 30% (train set) and 70% (test set) of the data (randomly split). EFA was conducted using minimal residual for factor extraction and oblimin rotation. Polychoric correlations were used for the analysis, and parallel analysis was used to determine the number of factors to retain. In the CFA we tested two models, the one extracted by the EFA and a single factor model. The indicators were left on the categorical, ordered, response scale, and diagonally weighted least squares (DWLS) was used to estimate the model parameters. The fitness of the models was compared using several fit indexes (Comparative Fit Index—CFI; Normed Fit Index—NFI; Non-Normed Fit Index—NNFI; Root Mean Square Error Approximation—RMSEA).

The measurement model that had better fit in the CFA was used in a structural equation modelling analysis (SEM). The effects of personality traits (measured by the Italian BFI-10 scores) on the two cyberbullying factors (latent dependent variables), direct and mediated by moral disengagement (latent mediator variable) were tested in the model, along with the direct effect of a measure on an ordinal scale of internet addiction. A multigroup SEM analysis was conducted for each of these grouping factors: gender, time on social networks and having (vs not having) more than one profile on social networks. Differences in the means of the latent variables across groups in each category were tested after assessing measurement invariance (configural, weak and strong), using the following analytical strategy. For each grouping factor, first we conducted a multigroup SEM analysis allowing all the parameters in the model to vary freely across groups (i.e. parameters were estimated separately for each group), and assessed the fit of the multigroup model using fit indexes to verify whether configural invariance held (good fit) or not. Weak and strong configural invariance were then tested fitting a second and a third multigroup model in which the loadings of the latent factors (step 2) and the intercept of the latent variables’ indicators (step 3) were constrained to be equal across groups, allowing all the other parameters to vary, and comparing the significance of change in χ2. A non-significant change was taken as evidence that the more restrictive model (higher invariance) fitted data as well as the less restrictive model, and therefore should be preferred (being more parsimonious) [71].

Personality traits were included as observed variables (aggregated scores of the two items in each BFI trait), as indicated for this brief scale Moderation of the effects of personality traits and moral disengagement by each of the grouping factors was also assessed in the multigroup analysis, by estimating parameters for the change in the slope of each effect across groups.

All the analyses were conducted using R version 4.0.2 [72], using the functions in the package lavaan (version 0.6–9) [73]. All the code and data used in the analysis are available online in a compressed folder (S2 File). In Fig 1 a visual summary of the methodology is presented.

Fig 1. Visual summary of the methodology.

Fig 1

Results

Cyberbullying perpetration

  • RQ1. Are there differences in the frequency of different types of cyberbullying behaviours, overall and as a function of socio-demographic variables?

We computed the percentages of the responses concerning the self-reported frequency of perpetration of the six different cyberbullying behaviours included in the questionnaire. The percentages are plotted in Fig 2 as stacked bar charts. For each behaviour, most participants reported they had never perpetrated it, and only a minority (from 2% to 18%), reported having it done three or more times. A significant Chi-square test showed that the distribution of self-reported frequencies varied across cyberbullying behaviours (χ2(15) = 631.2, p < .001). The lowest frequency of perpetration was found for sending mean or indecent emails (never enacted by 94.1% of participants), and the highest for sending embarrassing photos (more than once by 48.1% of participants).

Fig 2. Self-reported frequency of cyberbullying.

Fig 2

Stacked frequencies bar charts showing the distribution of responses about the self-reported frequency of different types of cyberbullying behaviours.

The distribution of the self-reported cyberbullying perpetration frequency varied significantly across genders for three behaviours: sending indecent messages (χ2(3) = 40.67, p < .001), sending indecent emails (χ2(3) = 8.92, p = .028), and sending embarrassing photos (χ2(3) = 10.06, p = .018). Girls were more likely to have never sent indecent messages (63.9%) than boys (48.2%), and less likely to have sent them more than five times (girls: 5.6%, boys: 13.1%). Girls were also more likely to have never sent indecent emails (95.5%) or embarrassing photos (58.6%) than boys (never sent indecent emails: 92.0%, never sent embarrassing photos: 54.9%).

Personality and moral disengagement

  • RQ2. Are different types of cyberbullying behaviours differently related to individual features such as personality traits and moral disengagement?

In Table 2 are reported the average scores for the measures of personality traits and moral disengagement in the sample, overall and by gender. A series of independent sample t-tests showed that girls were significantly less extravert and agreeable, they had less recourse to moral disengagement mechanisms and were less emotionally stable and open than boys. The average score on the question about feeling nervous without access to the internet is also reported in the bottom row (M = 2.69, SD = 1.18), and for this variable no significant differences were found by gender and age group.

Table 2. Descriptive statistics about personality, moral disengagement and internet addiction.

All participants Females Males p-value
N = 1228 N = 750 N = 476
Extraversion 3.35 (0.93) 3.25 (0.93) 3.50 (0.90) <0.001
Agreeableness 3.10 (0.87) 3.03 (0.86) 3.22 (0.86) <0.001
Conscientiousness 3.27 (0.92) 3.26 (0.92) 3.30 (0.92) 0.402
Emotional Stability 2.73 (1.06) 2.49 (1.04) 3.11 (0.98) <0.001
Openness 3.35 (1.00) 3.40 (0.97) 3.26 (1.03) 0.024
Moral Disengagement 1.77 (0.63) 1.64 (0.54) 1.96 (0.71) <0.001
Internet addiction 2.69 (1.18) 2.73 (1.18) 2.64 (1.18) 0.183

Average scores and standard deviations for the measures of the big five personality traits, the level of moral disengagement about cyberbullying and the ratings of the degree to which participants feel nervous (Internet addiction) when they do not have access to the internet (from 1 to 5). These descriptive statistics were computed both over the entire sample, collapsing across the gender of respondents, and separately for female and male participants. The p-values reported in the rightmost column are derived from independent samples t-test comparing the average scores for male and female participants for each measure.

Use of social media/networks

  • RQ3. Are different types of cyberbullying behaviours specifically related to different profiles of internet and social media usage?

In Table 3 are reported the frequencies of the responses to the questions about the time participants typically spend on social media every day, the number of social accounts held, and the number of friends/followers. Approximately half of participants (52.8%) declared to spend every day between 1 and 3 hours using social media. Most participants (69%) reported having only one social account per social media, and only 30% of them had more than one social account. More than half of the respondents (68%) reported having from 200 to 500 followers. For each of these variables, we used Chi-square tests to compare the distributions of responses across gender and age.

Table 3. Use of social media.

Variable N %
Time spent on social media
    Never 5 0.41%
    Less than one hour per day 155 12.65%
    From 1 to 3 hours per day 647 52.82%
    More than 3 hours per day 418 34.12%
Number of social accounts
    No account 15 1.23%
    One account 844 69.12%
    More than one account 362 29.65%
Number of followers
    < 200 221 18.42%
    200–500 821 68.42%
    501–1000 88 7.33%
    1001–5000 64 5.33%
    > 5000 6 0.50%

Descriptive statistics (frequencies) about the use of social media in the sample (N = 1228).

Girls reported using social media for more than 3 hours per day (41.5%) significantly (χ2(3) = 60.38, p < .001) more often than boys (22.5%). No differences were found between age groups.

Girls also reported having more than one account (33.4%) more frequently (χ2(2) = 13.40, p = .001) than boys (23.8%). The distribution of the responses about the number of social network accounts varied significantly across age groups (χ2(6) = 45.28, p < .001). Having more than one account tended to be more frequent in the lower age groups (14–15 years: 35.3%; 16–17 years: 30%), than in the other groups (18–20 years: 16.6%, 21–25 years: 15.8%), and in the highest age group having no account at all was significantly more frequent (10.5%) than in the other groups (0.8%-1.4%).

The distribution of the number of followers of each participant varied significantly across gender (χ2(4) = 46.52, p < .001): girls had more frequently between 200 and 500 friends/followers (74.6%) than boys (58.9%), while boys had more frequently less than 200 followers (27.7%) than girls (12.6%). No differences were found between age groups.

Whatsapp (91.9%) and instagram (91%) were the most used social networks, equally by boys and girls. YouTube was used by 67% of participants, Facebook by 28.8%, Google+ by 22.9%, Snapchat by 14.2% and Pinterest by 10.9%. Boys reported using YouTube (χ2(1) = 30.38, p < .001) more than girls. Girls reported using Pinterest (15,20%, χ2(1) = 36.18, p < .001), Snapchat (18.53%, χ2(1) = 29.88, p < .001) and Tumblr (8.27%, χ2(1) = 14.20, p < .001) more than boys (Pinterest: 4.20%, Snapchat: 7.35%, Tumblr: 2.94%).

Correlations between cyberbullying and personality

  • RQ3. Are different types of cyberbullying behaviours specifically related to different profiles of internet and social media usage?

To investigate the relationships between cyberbullying perpetration, personality traits and other individual variables we first computed a correlational analysis. Table 4 shows Pearson product-moment correlations between personality factors, aggressive behaviours, and moral disengagement about cyberbullying.

Table 4. Product-moment correlations between personality factors, aggressive behaviours, and moral disengagement.

E A C ES O MD
1. sending nasty or indecent messages 0.07 -0.15 *** -0.19 *** -0.02 0.04 0.34 ***
2. sending nasty or indecent emails 0.06 -0.05 -0.09 +0.01 0.03 0.29 ***
3. sending embarrassing photos of someone via cell phone 0.06 -0.09 -0.15 *** -0.02 0.10 * 0.16 ***
4. pretending to be someone else on the Internet 0.01 -0.09 * -0.20 *** -0.02 0.06 0.19 ***
(p = .045)
5. telling someone else’s secrets online or through a cell phone without permission 0.06 -0.06 -0.15 *** -0.03 0.04 0.13 ***
6. spreading gossip about someone on the Internet 0.11 ** -0.12 ** -0.11 ** -0.01 0.04 0.19 ***
(p = .009) (p = .002) (p = .006)

E = Extraversion. A = Agreeableness. C = Conscientiousness. ES = Emotional Stability. O = Openness. MD = Moral Disengagement.

*p < .05.

** p < .01.

*** p < .001.

Among the personality traits, conscientiousness was significantly and negatively correlated with all the types of cyberbullying but sending mean email. Agreeableness was negatively correlated with sending mean messages, pretending to be someone else and spreading gossip, while openness and extraversion were positively correlated with, respectively, sending embarrassing photos and pretending to be someone else.

Moral disengagement was positively and significantly correlated with all the aggressive behaviours, as expected (r ranging from .16 to .34).

Predictors of cyberbullying behaviours

We investigated the predictors of the self-reported frequency of perpetration of the 6 different cyberbullying behaviours using 6 multiple regression models. We considered 12 variables (demographics, personality, use of social networks, moral disengagement, and internet addiction) as possible predictors of cyberbullying, using treatment coding for all the non-numerical variables, and entering simultaneously all the predictors. Since three categorical variables have 3 levels, each of them was coded using two binary predictors, and the total number of predictors in the models was therefore 15. The analyses were conducted after filtering out data from participants that reported to never use social media, or to not have any accounts on them, or that did not provide answers to the items about cyberbullying perpetration. The few participants in the 21–25 age group were also excluded. Table 5 shows the results of the analysis, in the form of Odds Ratio (OR) and associated p-value for all the predictors, and the estimates of the percentage of variance explained by each model (Nagelkerke’s R2). Being multinomial (ordered) models, an OR significantly greater than 1 for a predictor indicates that the probability that the respondent declared to have never perpetrated a specific form of cyberbullying was associated with, and tended to decrease across, the levels of the predictor (whether it is continuous or discrete). While the probability of having perpetrated the given behaviour with any given frequency, as opposed to never or a lower frequency, tended to increase. The opposite response pattern concerning the frequency of cyberbullying perpetration corresponds to an OR significantly lower than 1. The response probabilities of the different frequencies of perpetrating various forms of cyberbullying, as a function of the significant predictors in the regression analyses, are reported in a series of plots in S1 File.

Table 5. Results of the ordinal regressions models for the responses about the frequency of different cyberbullying behaviours.

1: Sending mean / indecent messages 2: Sending mean / indecent emails 3: Sending embarrassing photos 4: Pretending to be someone else 5: Revealing secrets 6: Spreading rumors/gossip
Predictors OR p OR p OR p OR p OR p OR p
Gender: M 2.35 <0.001 1.47 0.235 1.32 0.045 0.80 0.199 0.88 0.390 0.93 0.652
Age: 16–17 years (vs 14–15 years) 1.20 0.216 0.77 0.454 0.93 0.614 0.91 0.577 0.97 0.815 1.20 0.273
Age: 18–20 years (vs 14–15 years) 1.36 0.074 1.36 0.422 1.14 0.417 0.91 0.633 0.93 0.650 1.00 0.992
Agreeableness 0.78 <0.001 0.85 0.264 0.90 0.098 0.92 0.287 0.95 0.428 0.82 0.009
Extraversion 1.05 0.509 1.19 0.271 1.04 0.556 0.90 0.191 1.12 0.089 1.23 0.008
Conscientiousness 0.79 <0.001 0.86 0.283 0.81 0.001 0.73 <0.001 0.83 0.005 0.88 0.099
Emotional Stability 0.95 0.490 1.01 0.931 1.04 0.555 1.14 0.103 1.09 0.204 1.05 0.568
Openness 1.10 0.141 1.08 0.598 1.24 <0.001 1.14 0.074 1.13 0.049 1.12 0.137
N. Followers: < 200 (vs 200–500) 0.83 0.291 0.98 0.951 0.61 0.004 0.67 0.059 0.59 0.004 0.75 0.184
N. Followers: > 500 (vs 200–500) 1.01 0.967 0.71 0.431 0.86 0.409 0.96 0.847 0.74 0.106 1.28 0.228
Time on SN: < 1 h/day (vs 1–3 h/d) 1.09 0.680 0.35 0.171 0.68 0.063 0.62 0.103 0.56 0.012 0.82 0.452
Time on SN: > 3 h/day (vs 1–3 h/d) 1.44 0.013 1.11 0.754 1.00 1.000 1.00 0.990 1.08 0.573 1.17 0.332
N. of SN accounts: > 1 (vs 1) 2.15 <0.001 1.62 0.113 1.60 0.001 2.98 <0.001 1.46 0.007 2.03 <0.001
Internet addiction 1.07 0.238 1.17 0.246 1.17 0.005 1.16 0.024 1.24 <0.001 1.06 0.358
Moral Disengagement 1.78 <0.001 2.07 <0.001 1.28 <0.001 1.45 <0.001 1.24 0.001 1.48 <0.001
Observations 1120 1120 1120 1120 1120 1120
R2 Nagelkerke 0.226 0.163 0.111 0.1777 0.106 0.126

The values in this table correspond to the Odds Ratios (OR, and associated p-values) for the effects of different predictors on the self-reported frequency of 6 different cyberbullying behaviours, estimated by fitting (for each behaviour) an ordinal multiple regression. All the predictors were entered simultaneously in the regression models, in which the dependent variables were ratings of the reported frequency of the perpetration of the behaviours by the respondents, expressed on a 5-point frequency scale (from “never” to “more than 5 times”). SN = Social Networks.

As it can be seen in the table, among the predictors considered in the analysis only moral disengagement was significantly associated with all the forms of cyberbullying (with OR ranging from 1.24 to 1.78, p < .001). Different predictors were in fact associated with different behaviours.

Age was not associated with any behaviour. Gender was associated with sending mean or indecent messages, whose odds were 2.35 times higher for boys than for girls (p < .001), and with sending embarrassing photos (OR = 1.32, p = .045). Other significant predictors for this behaviour, both with ORs smaller than 1 indicating a protective effect, were conscientiousness (OR = 0.79, p < .001) and agreeableness (OR = 0.78, p < .001). Besides these personality traits the results of the analysis showed that the likelihood of sending mean messages was significantly higher for those spending more than 3 h/d on social networks (OR = 1.44, p = .013) than for those spending 1 to 3 h/d on them, and for those who reported to have more than one profile on social networks (OR = 2.15, p <. 001). Overall, the model explained about 23% of the variance in the frequency of this type of cyberbullying.

The likelihood of sending mean or indecent emails was only significantly predicted by moral disengagement (OR = 2.02, p < .001). Sending embarrassing photos was less likely perpetrated by girls, individuals with higher conscientiousness (OR = 0.81, p = .001) and fewer followers (OR = 0.61, p = .004), and was more likely perpetrated by those with higher openness (OR = 1.24, p < .001), having multiple accounts on some social networks (OR = 1.60, p = .001) and higher addition to the internet (OR = 1.17 p = .005).

Pretending to be someone else online when interacting on social networking sites was less likely in more conscientious individuals (OR = 0.73, p < .001) and more likely in those having multiple accounts on some social networks (OR = 2.98, p < .001) and higher addition to the internet (OR = 1.16 p = .024).

Revealing secrets about someone online was also less likely in more conscientious individuals (OR = 0.83, p = .005) and in those having less than 200 followers (OR = 0.59, p = .004) and spending less than 1h/d on social networks (OR = 0.56, p = .012), and more likely in more open individuals (OR = 1.13, p = .049), in those who reported more getting nervous without internet (OR = 1.24, p < .001), and in those having more than one profile on social networks (OR = 1.46, p = .007).

Lastly, the likelihood of spreading rumors or gossip online was higher in more extraverted individuals (OR = 1.23, p = .008) and in those having more than one profile on some social network sites (OR = 2.03, p < .001), while it was less likely in more agreeable respondents (OR = 0.82, p = .009).

Latent variable analyses

  • RQ4. Is cyberbullying better conceived and measured as a unitary construct or as a multidimensional construct?

In the light of the results of the regression analysis, we examined the factorial structure of the cyberbullying scale that we used [51], comprising the items with the frequency of different cyberbullying behaviours. We randomly split the dataset into a training subset (30%, N = 336) and a test subset (70%, N = 784). On the training subset we conducted an Exploratory Factor Analysis, using minimal residual for factor extraction and oblimin rotation. Polychoric correlations were used for the analysis, and parallel analysis was used to determine the number of factors to retain. The model extracted comprised two factors, each loading on 3 items (Table 6): one -Cyb1- loaded on sending mean messages (loading = 0.66), sending mean emails (loading = 0.77), and impersonating someone else online (loading = 0.43), and the other one -Cyb2- loaded the remaining three cyberbullying behaviours (sending embarrassing photos: loading = 0.42, revealing secrets: loading = 0.93, spreading rumors/gossip: loading = 0.60). The factors were positively correlated (r = 0.43), and together explained 52% of the variance.

Table 6. Results of the exploratory factor analysis of cyberbullying perpetration.

Cyberbullying behaviour (item) Cyb1 Cyb2 u
1. Sending nasty or indecent messages 0.66 0.55
2. Sending nasty or indecent emails 0.77 0.44
3. Sending embarrassing photos of someone via cell phone 0.42 0.58
4. Pretending to be someone else on the Internet 0.43 0.65
5. Telling someone else’s secrets online / by cell phone without permission 0.93 0.19
6. Spreading gossip about someone on the Internet 0.60 0.49
Proportion of variance explained (R 2 ) 0.25 0.27

Results of the exploratory factor analysis of the cyberbullying perpetration items behaviour items, conducted on a randomly selected subset of participants (N = 336). For each item we report the loadings on each of the two latent factors extracted in the analysis and the proportion of unique item variance (u). For each factor we also report the relative proportion of explained variance. The loadings presented correspond to the rotated solution (pattern matrix). Factor loadings < .4 were omitted from the table.

On the test set we then conducted two Confirmatory Factor Analyses (CFA), one using the single factor model used in the Meter and Bauman scale [51], and the other using the 2-factor model suggested by the EFA. Both models had a very good fit to the data, but the 2-factor model had slightly better fit according to all the fit measures used [1 factor: Chi2(9) = 19.027, p = .025, N = 784, CFI = 0.991, NFI = 0.984, NNFI = 0.986; 2-factor: Chi2(8) = 11.175, p = 0.192, CFI = 0.997, NFI = 0.991, NNFI = 0.995].

The latent cyberbullying factors were used in a Structural Equation Modelling analysis (SEM) to test hypotheses about the direct and indirect effects of personality, moral disengagement, and internet addiction on the different types of cyberbullying. The structural model tested in the analysis is presented in Fig 3 along with the standardised estimates of all the path coefficients (β) (model fit statistics are reported in the caption).

Fig 3. Structural equation model of the relationships between personality, moral disengagement, and cyberbullying factors.

Fig 3

Ovals and rectangles represent latent and manifest variables respectively. Standardized path coefficients are reported for all the direct effects tested in the model, and the colours of the paths represent the sign of the coefficients (orange = positive; blue = negative). Insignificant effects are represented by dashed arrows. [N = 1139, χ2(141) = 358.64 (p = .000); RMSEA = .037 (90% CI = [.032, .042]); NNFI = .977; CFI = .964].

As it can be seen, and consistently with the previous analyses, each of the cyberbullying factors was associated with some, but not all, of the BFI personality traits. And whenever a trait was significantly associated with both cyberbullying factors, the strength of association (as measured by the standardised path coefficients) varied across factors. In most cases, the strength of the association was greater for the first factor than for the second one. This was particularly the case for the positive effect of moral disengagement, but also for the negative (i.e. protective) effect of conscientiousness and agreeableness. Conversely, the personality factors that were positively associated with cyberbullying tended to be associated only (i.e. extraversion) or more strongly (i.e. openness) with the second cyberbullying factor. Overall, the model was able to explain 50% of the variance in the first latent cyberbullying factor, and 24% in the second one.

Given that all the personality traits but agreeableness were also significantly associated with moral disengagement, explaining about 4% of the variability in this latent variable, we tested the indirect effects of each personality factor on the cyberbullying factors mediated by their effect on moral disengagement. In Table 7 are reported the results of these tests. As it can be seen in the table, all the personality factors that were directly associated with moral disengagement had a significant indirect effect on the cyberbullying factors. The tests of the total effects of the personality factors on cyberbullying were significant except for the one of emotional stability, and confirmed that agreeableness and conscientiousness tended to reduce cyberbullying, particularly of the type involving direct aggression toward others online (cyberbullying factor 1), while openness and extraversion tended to increase cyberbullying, particularly of the type involving damages to someone’s reputation or public image (cyberbullying factor 2).

Table 7. Results of the mediation analysis from the structural equation modelling analysis.

Direct effects Indirect effects Total effects
Effect Est. p Effect Est. p. Effect Est p.
A → CBY 1 -0.157 < .000 A → MD → CYB 1 -0.030 0.139 A → CBY 1 -0.186 < .000
C → CYB 1 -0.184 < .000 C → MD → CYB 1 -0.076 < .000 C → CYB 1 -0.260 < .000
ES → CBY 1 -0.010 0.795 ES → MD → CYB 1 0.065 0.002 ES → CBY 1 0.054 0.191
O → CYB 1 0.122 0.002 O → MD → CYB 1 -0.040 0.033 O → CYB 1 0.081 0.048
E → CYB 1 0.029 0.454 E → MD → CYB 1 0.053 0.009 E → CYB 1 0.082 0.041
A → CBY 2 -0.100 0.011 A → MD → CYB 2 -0.017 0.146 A → CBY 2 -0.117 0.003
C → CYB 2 -0.140 < .000 C → MD → CYB 2 -0.042 0.001 C → CYB 2 -0.182 < .000
ES → CBY 2 –0.018 0.650 ES → MD → CYB 2 0.036 0.004 ES → CBY 2 0.018 0.633
O → CYB 2 0.147 < .000 O → MD → CYB 2 -0.023 0.040 O → CYB 2 0.124 0.001
E → CYB 2 0.112 0.005 E → MD → CYB 2 0.030 0.015 E → CYB 2 0.141 < .000
A → MD -0.048 0.135
C → MD -0.134 < .000
ES → MD 0.112 0.001
O → MD -0.070 0.033
E → MD 0.092 0.008
MD → CYB 1 0.577 < .000
MD → CYB 2 0.323 < .000

To test differences between groups defined by gender (females vs males), time on social networks (+3 h/d vs 1–3 h/d) and number of profiles on social networks (1 profile vs >1 profile) in the mean score of the latent factors (the two cyberbullying factors and moral disengagement), and to test possible moderating effects of each of the grouping factors on the direct and indirect effects of personality and moral disengagement on the cyberbullying factors, three multigroup SEM analyses were conducted, one for each of the grouping variables. In these analyses, first we always tested measurement invariance (configural, weak and strong), since comparisons across the groups in the mean scores of the latent variables and in the regression paths could only be meaningful if strong invariance holds.

The results of invariance tests, and the parameters of the multigroup models for each group and grouping factor are provided in S2 File. Strong measurement invariance held across groups for each grouping factor, indicating that it was possible to compare latent variables means and effects estimates across groups.

The multigroup analysis about gender revealed significantly higher mean levels of moral disengagement (diff. = 1.782, p = .010) for males than for females. Moreover, the results showed that gender significantly moderated both the effect of openness on the first cyberbullying factor (slope females = 0.198, slope males = 0.029, diff. = -0.169, p = .026), and the effect of extraversion on the second cyberbullying factor (slope females = 0.047, slope males = 0.219, diff. = 0.171, p = .034).

The mean of moral disengagement was significantly higher in those spending 1–3 hour per day on SN than in those spending more than 3 h/d (diff. = 1.168, p = .039), and time on SN was found to be a moderator of the direct effect of emotional stability on moral disengagement (slope +3 h/d = 0.217, slope 1–3 h/d = 0.005, diff. = 0.212, p = .005) and of the indirect effects of this personality trait on the cyberbullying factors (cyberbullying factor. 1: diff. = 0.133, p = .004; cyberbullying factor 2: diff. = 0.071. p = .025).

Lastly, the results of the multigroup analysis involving the number of social network profiles revealed significantly higher mean levels of moral disengagement in those with more than one profiles than in those with only one social network profile (diff. = 1.270, p = 0.045), but no differences in the mean of the latent cyberbullying factors. Moreover, the number of profiles significantly moderates the direct effect of extraversion on moral disengagement (slope 1 profile = 0.142, slope >1 profiles = -0.022, diff. = 1.64, p = .020) and the indirect effect of this personality factor on the cyberbullying factors mediated by moral disengagement (cyberbullying factor. 1: diff. = 0.98, p = .040; cyberbullying factor 2: diff. = 0.059. p = .043).

Discussion

The results of our study showed that different types of aggressive online behaviours are, reportedly, enacted with differential frequency by adolescents, confirming H1. For all the forms of cyberbullying considered, most participants reported they have never committed them, and for some behaviours, such as sending mean or aggressive emails, even reports of having perpetrated them sometimes were extremely rare. This last result is possibly related to uncommon use of emails among adolescents [74]. But other types of cyberbullying, like aggressions by text messages or sending embarrassing photos of someone, were perpetrated at least sometimes by more than 40% of participants, and often (≥ 3 times) by 13–18%. Gender differences in the distribution of cyberbullying frequency were found only for some specific forms of cyberbullying, again sending mean messages or embarrassing photos, therefore H2 is also confirmed by the results. However, differently from other studies (see, for example, [54, 75, 76]) no differences across age groups were found. This result is probably due to the narrow age range of our sample that did not include children, in which young adults were almost entirely absent.

Moral disengagement on cyberbullying was strongly associated with all forms of cyberbullying, confirming previous findings [13, 51, 52], while personality was not: conscientiousness was the personality trait that was associated with the highest number of cyberbullying behaviours (4 out of 6, all but sending mean emails and spreading rumor/gossip), in each case having a protective effect (i.e. more conscientious individuals reported less frequent perpetration) [77]. Agreeableness also had a protective effect [42], but only on sending mean messages. Openness was instead positively associated with sending mean messages, sending embarrassing photos and revealing secrets, and extraversion with spreading rumors/gossip. Emotional stability was not associated with any behaviours, in contrast to what has been previously reported by one study [65]. However, in the SEM analysis we found significant positive indirect effects of emotional stability on both cyberbullying factors, mediated by moral disengagement. The findings about a positive association between emotional stability and moral disengagement also contrast with previous findings [78]. The SEM analysis also confirmed that the effect of moral disengagement was stronger on cyberbullying acts involving direct aggressions than on acts damaging social image or reputation. Regarding the relationships between personality traits and different cyberbullying behaviours, it is interesting to note that no two behaviours are associated with the same traits. This suggests that the personality structures underlying the different behaviours may be quite specific (H3).

The results regarding the association between time spent online and engaging in virtual offensive behaviours is particularly relevant as it becomes clearer and clearer how internet use is increasing across cultures [79]. The ordinal regression analysis showed, first of all, that the daily amount of time spent on social networks is predictive only of some cyberbullying behaviours, not all, confirming H4. This specific relationship between the frequency of internet use and specific cyberbullying behaviours had not been highlighted by other studies that, instead, had indicated a generic relationship [42, 68]. Specifically, in our findings the likelihood of sending mean messages (with some frequency) tended to be higher in those that spend more than 3 h/d on social networks than in those that spend between 1 and 3 h/d, while the likelihood of sending embarrassing photo and revealing secrets tented to be lower in those that use social networks less than 1 h/d. Moreover, the results of the multigroup SEM analysis showed that time on social networks moderated the indirect effect of emotional stability on both the cyberbullying factors, which was only significant and positive (opposite in sign to what previous research would have let to expect) for those spending more than 3 h/d on social networks.

Lower likelihood of perpetrating the latter two behaviours was also found in individuals with few followers/friends on social networks. It is possible that these factors were associated with cyberbullying because spending more or less time online, or having a wider or a smaller social network simply increases or decreases the occasions for acts of cyberbullying. However, it is not clear why this association was only found with these specific behaviours and not for all. Among the social media use variables that we considered, at least one was however positively and strongly associated with almost all the cyberbullying behaviours: having more than 1 profile on social networks, a factor that increased the odds of cyberbullying between 46% and 198%, depending on the behaviour considered. Only the likelihood of sending mean/indecent emails was not associated with this factor. It might be that having more profiles on social networks is an enabling factor for cyberbullying, a means for perpetrating aggressive acts online in disguise trying to escape possible consequences of the acts. It is worth noting that the strongest association was found between this factor and pretending to be someone else online. But it is also possible that some other individual factor, not measured in the current study, might be responsible for the association. It is also interesting to notice that the multigroup SEM analysis showed higher levels of moral disengagement in those having more than 1 profile on social networks, and also that this factor moderated (increased) the indirect effects of extraversion on cyberbullying mediated by moral disengagement. Further studies should try to investigate this matter more in depth.

Lastly, our analysis highlighted an association between internet addiction and some bullying behaviours [77], such as sending embarrassing photos, revealing secrets, and pretending to be someone else online, whose frequency was higher in individuals that tended to be nervous without access to the internet. These are three behaviours that, in addition to moral disengagement, are all associated with a low level of conscientiousness. This makes it possible to consider a relationship between the diminished capacity for self-control, self-regulation and impulse control and forms of internet addiction. This consideration is in line with what has been highlighted by a meta-analysis in which it emerges that among the factors that influence internet addiction, in addition to the measuring instrument used, and the cultural area of reference, there is the young age of the participants [80]. Unfortunately, however, in our study, the degree of internet addiction was measured with a single item. Therefore, it is incautious to go into more fine-grained explanations of the relationship between internet addiction and the enactment of specific aggressive virtual behaviours.

Our last research question concerned the measurement of cyberbullying, and specifically whether it should be conceived and measured as a unitary or a multidimensional (H5) construct. The results of our latent variable analyses all seem to point toward a multivariate nature of cyberbullying, confirming H5. The exploratory factor analysis suggests that one could distinguish between a component related to harmful acts that an individual might commit to someone else directly (e.g. offending the target by direct messages, emails, or deceiving someone about their identity), and a component related to acts that might hurt someone even without a direct interaction and by damaging the target’s social image (i.e. acts in which harm require the involvement of a social audience). And the confirmatory factor analysis showed that the 2-factor structure has better fit than the single factor solution. Interestingly, the results of the SEM analysis suggested that these factors might be differentially affected by personality and moral disengagement. Direct aggressive acts (Cyberbullying factor 1) are more strongly associated with moral disengagement, with having multiple SN profiles, and with personality traits such as conscientiousness and agreeableness (both playing a mitigating role) than acts that harm someone indirectly (Cyberbullying factor 2). The latter form of cyberbullying, conversely, is particularly associated with extraversion and openness. Moreover, only for direct aggressive acts we found differences between female and male cyber-aggressors. Overall, these findings suggest that indeed cyberbullying might not be a unitary phenomenon, as other studies also had indicated [34, 43, 62, 63, 8183] and that differences in the findings from the research literature about the association between cyberbullying and various demographic and individual variables could be the results of differences in the specific measurement of cyberbullying used across studies. Differentiating distinct forms of cyberbullying with different antecedents or moderators could help to identify in early evaluations which subjective and contextual characteristics can more easily lead to the emergence of specific offensive virtual acts. And from this, can descend not only the understanding of the more detailed forms of cyberbullying, but also the design of interventions aimed more effectively and more promptly at its prevention and mitigation.

Limitations

The study reported in this paper has some limitations that need to be acknowledged. The first limitation concerns the type of measurement of cyberbullying used in the study, which was self-reported, and therefore possibly affected by biases such as the social desirability effect, the tendency to provide responses that give a better impression of oneself as a person and member of society [84, 85]. When it comes to reporting the frequency of perpetrating aggressive behaviours, it is likely that this phenomenon might have been at play, and, in this study, it was not controlled for. Even if that was the case, however, this bias should not undermine our findings about predictors of cyberbullying, but only cause our estimates of the frequency of the phenomenon among adolescents to be lower than the actual frequency. Nonetheless, repeating this study using observational data as an outcome, possibly collected from adolescents’ activity on social networks (posts, tweets, comments, photos or other forms of shares directly or indirectly involving a victim), would increase the validity of the results and the confidence in our findings.

The second limitation of this study lies in the cross-sectional nature of the survey, which only allows us to draw conclusions about statistical associations between individual variables and cyberbullying, preventing us from being able to infer causal relationships. While for ethical reasons studying this phenomenon experimentally would be very difficult, if not unfeasible, at least a longitudinal design could partly help to overcome this limitation concerning internal validity.

A third limitation is related to the way some variables were measured. On the one hand, in fact, one of the predictors that were statistically associated with more bullying behaviours was internet addiction, which was only measured with a single item on a 5-point Likert scale. The effect of this variable on cyberbullying should be thus investigated more in depth, adopting more articulated measures, to validate and possibly extend our findings. On the other hand, even the scale we adopted to measure cyberbullying was quite specific and considered a limited number of behaviours only. This is an important limitation of the study. It is still to be determined, and certainly worth investigating, whether our findings about the multidimensional nature of cyberbullying would be found also using different measures and scales.

Lastly, our study was conducted on a sample of Italian adolescents, and although there is no reason to believe that our findings shouldn’t generalize to different cultural contexts, further studies should still be conducted on an international sample to empirically test this hypothesis.

Conclusions

Considering recent knowledge advances on cyberbullying, including the findings from the study presented in this paper, it seems reductive to qualify this offensive behaviour as a unitary phenomenon. Rather, considering the different variables involved, it seems more likely that there are different expressions of cyberbullying, offensive behaviours that can be differentiated by considering socio-demographic variables, personality characteristics, and the different relational tools available on the Internet.

The study presented here considered a scale with six items. For each of these items, which correspond to specific offending behaviours, different correlates of age, personality, and social media interaction were highlighted. From our results, it was also possible to put forward a conceptual framework that describes cyberbullying as a harmful behaviour that can have at least two facets: one related to offenses perpetrated directly to the victim, the other less explicit, which can involve other people and is indirect. It is legitimate to consider that with different scales, and with a greater number of items, it would be possible to point out further aspects of cyberbullying. In any case, the results obtained and the theoretical model proposed call for deeper investigations of cyberbullying, not only for its different manifestations, but also for individual and contextual reasons that make it occurring.

Supporting information

S1 Text. Questionnaire.

Full text of questionnaire used in the study.

(PDF)

S1 Script. R script for conducting the descriptive statistics reported in the paper.

(R)

S2 Script. R for conducting the regression analyses reported in the paper.

(R)

S3 Script. R script for conducting the exploratory and confirmatory factor analyses reported in the paper and the latent variable path analysis / SEM.

(R)

S1 Dataset. R Dataset for descriptive statistics.

Data are in native R format.

(RDATA)

S2 Dataset. R Dataset used for the regression and SEM analyses.

Data are in native R format.

(RDATA)

S3 Dataset. Dataset used for the regression and SEM analyses.

Data are in native comma separated value format.

(CSV)

S1 File. Plots of the effects of the significant predictors in the ordinal logistic regression models.

Each plot represents the estimated probability of the different responses concerning the frequency of perpetration of a given type of cyberbullying behaviour, as a function of one of the significant predictors. The probabilities were estimated from the fitted regression models presented in the paper. All the code for reproducing the plots is provided in S2 File.

(PDF)

S2 File. Multigroup SEM analyses.

The results of the multigroup analyses for three grouping factors are reported in this file: a) gender (females vs males), b) time on social network (>3 h/d vs 1–3 h/d), and number of social networks profiles (1 profile vs >1 profiles). For each factor we present the goodness-of-fit statistics of models assuming different levels of invariance and the path coefficients for the model assuming strong invariance.

(PDF)

Acknowledgments

We would like to thank all those who contributed to the realization of this work: the high school students, the teachers, and the school principals. A special thanks is also due to the students of the Cognitive Psychology course for their helpful contribution in collecting the data, and to Antonio Rizzo for his concrete support in order to see this work published.

Data Availability

All relevant data are within the manuscript and its Supporting Information files (S2 File).

Funding Statement

The author(s) received no specific funding for this work.

References

  • 1.Dooley JJ, Pyzalski J, Cross DS. Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. J Psychol. 2009;217(4): 182–188. doi: 10.1027/0044-3409.217.4.182 [DOI] [Google Scholar]
  • 2.Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N. Cyberbullying: Its nature and impact in secondary school pupils. J Child Psychol Psychiatry. 2008;49: 376–385. doi: 10.1111/j.1469-7610.2007.01846.x [DOI] [PubMed] [Google Scholar]
  • 3.Tokunaga RS. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Comput Hum Behav. 2010;26: 277–287. doi: 10.1016/j.chb.2009.11.014 [DOI] [Google Scholar]
  • 4.Slonje R, Smith PK, Frisén A. The nature of cyberbullying, and strategies for prevention. Comput Hum Behav. 2013;29: 26–32. doi: 10.1016/j.chb.2012.05.024 [DOI] [Google Scholar]
  • 5.Ybarra M, Mitchell KJ. Youth engaging in online harassment: Associations with caregiver-child relationships, internet use, and personal characteristics. J Adolesc. 2004;27: 319–336. doi: 10.1016/j.adolescence.2004.03.007 [DOI] [PubMed] [Google Scholar]
  • 6.Ybarra ML, Mitchell KJ, Wolak J, Finkelhor D. Internet prevention messages. Targeting the right online behaviors. Arch Pediatr Adolesc Med. 2007;161: 138–145. doi: 10.1001/archpedi.161.2.138 [DOI] [PubMed] [Google Scholar]
  • 7.Hinduja S, Patchin JW. Bullying, cyberbullying, and suicide. Arch Suicide Res. 2010; 14(3): 206–221. doi: 10.1080/13811118.2010.494133 [DOI] [PubMed] [Google Scholar]
  • 8.Hinduja S, Patchin JW. Social influences on cyberbullying behaviors among middle and High School students. J Youth Adolesc. 2013;42(5): 711–722. doi: 10.1007/s10964-012-9902-4 [DOI] [PubMed] [Google Scholar]
  • 9.Holt MK, Vivolo-Kantor AM, Polanin JR, Holland KM, DeGue S, Matiasko JL, et al. Bullying and suicidal ideation and behaviors: A meta-analysis. Pediatrics. 2015;135(2): e495–e509. doi: 10.1542/peds.2014-1864 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Zhu C, Huang S, Evans R, Zhang W. Cyberbullying among adolescents and children: A comprehensive review of the global situation, risk factors, and preventive measures. Front Public Health. 2021;9: 634909. doi: 10.3389/fpubh.2021.634909 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11.Moreno MA, Suthamjariya N, Selkie E. Stakeholder perceptions of cyberbullying cases: Application of the uniform definition of bullying. J Early Adolesc. 2018;62(4): 444–449. doi: 10.1016/j.jadohealth.2017.11.289 [DOI] [PubMed] [Google Scholar]
  • 12.Hamm MP, Newton AS, Chisholm A, Shulhan J, Milne A, Sundar P, et al. Prevalence and effect of cyberbullying on children and young people: A scoping review of social media studies. JAMA Pediatr. 2015;169: 770–777. doi: 10.1001/jamapediatrics.2015.0944 [DOI] [PubMed] [Google Scholar]
  • 13.Parlangeli O, Marchigiani E, Bracci M, Duguid AM, Palmitesta P, Marti P. Offensive acts and helping behavior on the internet: An analysis of the relationships between moral disengagement, empathy and use of social media in a sample of Italian students. Work. 2019;63(3): 469–477. doi: 10.3233/WOR-192935 [DOI] [PubMed] [Google Scholar]
  • 14.Dominguez-Alonso J, Vazquez-Varela E, Nuñez-Lois S. Cyber bullying escolar: Incidencia del teléfono móvil e internet en adolescentes. RELIEVE Rev Electrón de Investig y Evaluación Educ. 2017;23: 1–11. doi: 10.7203/relieve.23.2.8485 [DOI] [Google Scholar]
  • 15.Barragán Martín AB, Molero Jurado MdM, Pérez-Fuentes MdC, Simón Márquez MdM, Martos Martínez Á, Sisto M, et al. Study of cyberbullying among adolescents in recent years: a bibliometric analysis. Int J Environ Res Public Health. 2021;18(6):3016. doi: 10.3390/ijerph18063016 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 16.Bottino SM, Bottino CM, Regina CG, Correia AV, Ribeiro WS. Cyberbullying and adolescent mental health: Systematic review. Cad saude publica. 2015;31(3):463–475. doi: 10.1590/0102-311x00036114 [DOI] [PubMed] [Google Scholar]
  • 17.Zych I, Ortega-Ruiz R, del Rey R. Systematic review of theoretical studies on bullying and cyberbullying: Facts, knowledge, prevention, and intervention. Aggress Violent Behav. 2015;23: 1–21. doi: 10.1016/j.avb.2015.10.001 [DOI] [Google Scholar]
  • 18.Waqas A, Salminen J, Jung S-g, Almerekhi H, Jansen BJ. Mapping online hate: A scientometric analysis on research trends and hotspots in research on online hate. PLoS ONE. 2019;14(9):e0222194. doi: 10.1371/journal.pone.0222194 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19.Meter DJ, Budziszewski R, Phillips A, Beckert TE. A Qualitative Exploration of College Students’ Perceptions of Cyberbullying. TechTrends. 2021;65: 464–472. doi: 10.1007/s11528-021-00605-9 [DOI] [Google Scholar]
  • 20.Kowalski RM, Limber SP, McCord A. A developmental approach to cyberbullying: Prevalence and protective factors, Aggress Violent Behav. 2019;45:20–32. doi: 10.1016/j.avb.2018.02.009 [DOI] [Google Scholar]
  • 21.Bauman S, Baldasare A. Cyber aggression among college students: Demographic differences, predictors of distress, and the role of the university. J Coll Stud Dev. 2015;56: 317–330. doi: 10.1353/csd.2015.0039 [DOI] [Google Scholar]
  • 22.Rigby K. New perspectives on bullying. London and Philadelphia: Jessica Kingsley; 2002. [Google Scholar]
  • 23.Brighi A, Menin D, Skrzypiec G, Guarini A. Young, bullying, and connected. Common pathways to cyberbullying and problematic internet use in adolescence. Front Psychol. 2019;10: 1467. doi: 10.3389/fpsyg.2019.01467 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24.O’Brien N. Secondary school teachers’ and pupils’ definitions of bullying in the UK: A systematic review. Evid Policy. 2009; 5: 399–427. doi: 10.1332/174426409X478761 [DOI] [Google Scholar]
  • 25.Vandebosch H, Van Cleemput K. Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychol Behav. 2008;11: 499–503. doi: 10.1089/cpb.2007.0042 [DOI] [PubMed] [Google Scholar]
  • 26.Lozano-Blasco R., Cort’es-Pascual A., & Latorre-Martínez M. P. (2020). Being a cybervictim and a cyberbully—The duality of cyberbullying: A meta-analysis. Computers in Human Behavior, 111, 106444. doi: 10.1016/j.chb.2020.106444 [DOI] [Google Scholar]
  • 27.Alanazi I, Alves-Foss J Cyber bullying and machine learning: a survey. Int Journal of Computer Science and Information Security (IJCSIS). 2020;18(10). doi: 10.5281/zenodo.4249340 [DOI] [Google Scholar]
  • 28.Talpur BA, O’Sullivan D. Multi-Class imbalance in text classification: a feature engineering approach to detect cyberbullying in Twitter. Informatics. 2020;7(4): 52. doi: 10.3390/informatics7040052 [DOI] [Google Scholar]
  • 29.Alam KS, Bhowmik S, Prosun PRK. Cyberbullying detection: an ensemble based machine learning approach. Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021; 710–715. doi: 10.1109/ICICV50876.2021.9388499 [DOI] [Google Scholar]
  • 30.aCheng L, Li J, Silva Y, Hall D, Liu H. PI-Bully: Personalized Cyberbullying Detection with Peer Influence. Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence AI for Improving Human Well-being. 2019; 5829–5835. doi: 10.24963/ijcai.2019/808 [DOI] [Google Scholar]
  • 31.bCheng L, Guo R, Silva Y, Hall D, Liu H. Hierarchical attention networks for cyberbullying detection on the instagram social network. In Proceedings of the 2019 SIAM international conference on data mining. 2019; 235–243. doi: 10.1137/1.9781611975673.27 [DOI] [Google Scholar]
  • 32.Dani H, Li J, Liu H. Sentiment informed cyberbullying detection in Social Media. In: Ceci M, Hollmén J, Todorovski L, Vens C, Džeroski S, editors. Machine learning and knowledge discovery in databases. ECML PKDD 2017. Lecture Notes in Computer Science, vol 10534. Springer, Cham; 2017. doi: 10.1007/978-3-319-71249-9_4 [DOI] [Google Scholar]
  • 33.Li HHS, Yang Z, Lv Q, Rafiq RI, Han R, Mishra S. A comparison of common users across instagram and ask. fm to better understand cyberbullying. In: 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014; 355–362. doi: 10.1109/BDCloud.2014.87 [DOI] [Google Scholar]
  • 34.Álvarez-García D, Barreiro-Collazo A, Núñez Perez JC, Dobarro A. Validity and reliability of the Cyber-aggression Questionnaire for Adolescents (CYBA). Eur J Psychol Appl to Leg Context. 2016;8(2): 69–77. doi: 10.1016/j.ejpal.2016.02.003 [DOI] [Google Scholar]
  • 35.Ševčíková A, Šmahel D. Online harassment and cyberbullying in the Czech Republic: Comparison across age groups. Z Psychol. 2009;217(4): 227–229. doi: 10.1027/0044-3409.217.4.227 [DOI] [Google Scholar]
  • 36.Williams K, Guerra N. Prevalence and predictors of Internet bullying. J Adolesc Health. 2007;41: S14–S21. doi: 10.1016/j.jadohealth.2007.08.018 [DOI] [PubMed] [Google Scholar]
  • 37.Barlett C, Coyne SM. A meta-analysis of sex differences in cyber-bullying behavior: The moderating role of age. Aggress Behav. 2014;40: 474–488. doi: 10.1002/ab.21555 [DOI] [PubMed] [Google Scholar]
  • 38.Lozano-Blasco R, Cortés-Pascual A. Problematic Internet uses and depression in adolescents: A meta-analysis. Comunicar. 2020;63:109–120. doi: 10.3916/C63-2020-10 [DOI] [Google Scholar]
  • 39.Park S, Na E-Y, Kim E-M. The relationship between online activities, netiquette and cyberbullying. Child Youth Serv Rev. 2014;42: 74–81. doi: 10.1016/j.childyouth.2014.04.002 [DOI] [Google Scholar]
  • 40.Bracci M, Duguid AM, Marchigiani E, Palmitesta P, Parlangeli O. Digital Discrimination: An Ergonomic Approach to Emotional Education for the Prevention of Cyberbullying. In: Bagnara S, Tartaglia R, Albolino S, Alexander T, Fujita Y, editors. Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018). Advances in Intelligent Systems and Computing, vol 826; Cham: Springer; 2019. [Google Scholar]
  • 41.Kokkinos CM, Antoniadou N, Cyber-bullying and cyber-victimization among undergraduate student teachers through the lens of the General Aggression Model, Comput Hum Behav. 2019; 98:59–68, doi: 10.1016/j.chb.2019.04.007 [DOI] [Google Scholar]
  • 42.Marciano L, Schulz PJ, Camerini AL. Cyberbullying perpetration and victimization in youth: A meta-analysis of longitudinal studies. J Comput Mediat Commun. 2020;25(2): 163–181. https://bit.ly/3iK8b0g. [Google Scholar]
  • 43.Tanrikulu I, Erdur-Baker Ö. Motives behind cyberbullying perpetration: a test of uses and gratifications theory. J Interpers Violence. 2021;36: 6699–6724. doi: 10.1177/0886260518819882 [DOI] [PubMed] [Google Scholar]
  • 44.John OP, Donahue EM, Kentle RL. The Big Five Inventory-Versions 4a and 54. Berkeley: University of California, Institute of Personality and Social Research; 1991. [Google Scholar]
  • 45.van Geel M, Goemans A, Toprak F, Vedder P. Which personality traits are related to traditional bullying and cyberbullying. Pers Individ Diff. 2017;106: 231–235. doi: 10.1016/j.paid.2016.10.063 [DOI] [Google Scholar]
  • 46.Mitsopoulou E, Giovazolias T. Personality traits, empathy and bullying behavior: A meta-analytic approach. Aggress Violent Behav. 2015;21: 61–72. doi: 10.1016/j.avb.2015.01.007 [DOI] [Google Scholar]
  • 47.Balakrishnan V, Khan S, Fernandez T, Arabnia HR. Cyberbullying detection on Twitter using Big Five and Dark Triad features. Pers Individ Differ. 2019;141: 252–257. doi: 10.1016/j.paid.2019.01.024 [DOI] [Google Scholar]
  • 48.Bandura A. Social cognitive theory of personality. In: Pervin L, John O, editors. Handbook of personality (2nd ed.). NewYork: Guilford Press; 1999. pp. 154–196. [Google Scholar]
  • 49.Bandura A, Barbaranelli C, Caprara GV, Pastorelli C. Mechanisms of moral disengagement in the exercise of moral agency. J Pers Soc Psychol. 1996;71(2): 364–374. doi: 10.1037/0022-3514.71.2.364 [DOI] [Google Scholar]
  • 50.Bussey K, Fitzpatrick S, Raman A. The role of moral disengagement and self-efficacy in cyberbullying. J Sch Violence. 2015;14: 30–46. doi: 10.1080/15388220.2014.954045 [DOI] [Google Scholar]
  • 51.Meter DJ, Bauman S. Moral disengagement about cyberbullying and parental monitoring: Effects on traditional bullying and victimization via cyberbullying involvement. J Early Adolesc. 2018;38: 303–326. doi: 10.1177/0272431616670752 [DOI] [Google Scholar]
  • 52.Paciello M, Tramontano C, Nocentini A, Fida R, Menesini E. The role of traditional and online moral disengagement on cyberbullying: do externalizing problems make any difference? Comput Hum Behav. 2020;103. doi: 10.1016/j.chb.2019.09.024 [DOI] [Google Scholar]
  • 53.Kyriakides L, Kaloyirou C, Lindsay G. An analysis of the Revised Olweus Bully/Victim Questionnaire using the Rasch measurement model. Br J Educ Psychol. 2006;76: 781–801. doi: 10.1348/000709905X53499 [DOI] [PubMed] [Google Scholar]
  • 54.Calvete E, Orue I, Estévez A, Villardón L, Padilla P, Cyberbullying in adolescents: Modalities and aggressors’ profile, Comput Hum Behav. 2010;26(5): 1128–1135. doi: 10.1016/j.chb.2010.03.017 [DOI] [Google Scholar]
  • 55.Shaw T, Dooley JJ, Cross D, Zubrick SR, Waters S. The Forms of Bullying Scale (FBS): Validity and reliability estimates for a measure of bullying victimization and perpetration in adolescence. Psychol Assess. 2013;25(4): 1045–1057. doi: 10.1037/a0032955 [DOI] [PubMed] [Google Scholar]
  • 56.Stewart RW, Drescher CF, Maack DJ, Ebesutani C, Young J. The development and psychometric investigation of the Cyberbullying Scale. J Interpers Violence. 2014;29: 2218–2238. doi: 10.1177/0886260513517552 [DOI] [PubMed] [Google Scholar]
  • 57.Thomas HJ, Scott JG, Coates JM, Connor JP. Development and validation of the Bullying and Cyberbullying Scale for Adolescents: A multi-dimensional measurement model. Br J Educ Psychol. 2018;89: 75–94. doi: 10.1111/bjep.12223 [DOI] [PubMed] [Google Scholar]
  • 58.Vessey J, Strout TD, DiFazio RL, Walker A. Measuring the youth bullying experience: a systematic review of the psychometric properties of available instruments. J Sch Health. 2014;84(12): 819–843. doi: 10.1111/josh.12210 [DOI] [PubMed] [Google Scholar]
  • 59.Olweus DA. Revised Olweus bully/victim questionnaire (OBVQ). 2006; APA PsycTests. doi: 10.1037/t09634-000 [DOI] [Google Scholar]
  • 60.Rigby K. Manual for the peer relations questionnaire (PRQ). The Professional Reading Guide. Point Lonsdale: Victoria: Australia; 1998. [Google Scholar]
  • 61.Menesini E, Nocentini A, Calussi P. The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychol Behav Soc Netw. May 2011: 267–274. doi: 10.1089/cyber.2010.0002 [DOI] [PubMed] [Google Scholar]
  • 62.Chun J, Lee J, Kim J, Lee S. An international systematic review of cyberbullying measurements. Comput Hum Behav. 2020; 113: 106485. doi: 10.1016/j.chb.2020.106485 [DOI] [Google Scholar]
  • 63.Palladino BE, Nocentini A, Menesini E. Psychometric properties of the Florence cyberbullying-cibervictimation scales. Cyberpsychol Behav Soc Netw. 2015;18(2): 112–119. doi: 10.1089/cyber.2014.0366 [DOI] [PubMed] [Google Scholar]
  • 64.Çetin B, Yaman E, Peker A. Cyber victim and bullying scale: A study of validity and reliability. Comput Educ. 2011;57(4): 2261–2271. doi: 10.1016/j.compedu.2011.06.014 [DOI] [Google Scholar]
  • 65.Escortell R, Aparisi D, Martinez-Monteagudo MC, Delgado B. Personality traits and aggression as explanatory variables of cyberbullying in Spanish preadolescents. Int J Environ Res Public Health. 2020;17: 5705. doi: 10.3390/ijerph17165705 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 66.Celik S, Atak H, Erguzen A. The Effect of Personality on Cyberbullying among university students in Turkey. Eurasian J Educ Res. 2012; 49: 129–150. [Google Scholar]
  • 67.Kokkinos CM, Voulgaridou I. Links between relational aggression, parenting and personality among adolescents. Eur J Dev Psychol. 201614: 249–264. doi: 10.1080/17405629.2016.1194265 [DOI] [Google Scholar]
  • 68.Parlangeli O, Marchigiani E, Guidi S, Bracci M, Andreadis A, Zambon R. I Do It Because I Feel that…Moral Disengagement and Emotions in Cyberbullying and Cybervictimisation. In: Meiselwitz G., editor. Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis. HCII 2020. Lecture Notes in Computer Science, vol 12194. Cham: Springer; 2020. pp. 289–304. doi: 10.1007/978-3-030-49570-1_20 [DOI] [Google Scholar]
  • 69.Rammstedt B, John OP. Measuring personality in one minute or less: A 10 item short version of the Big Five Inventory in English and German. J Res Pers. 2007;41: 203–212. doi: 10.1016/j.jrp.2006.02.001 [DOI] [Google Scholar]
  • 70.Guido G, Peluso AM, Capestro M, Miglietta M. An Italian version of the 10-item Big Five Inventory: An application to hedonic and utilitarian shopping values. Pers Individ Differ. 2015;76: 135–140. doi: 10.1016/j.paid.2014.11.053 [DOI] [Google Scholar]
  • 71.Beaujean A.A. Latent Variable Modeling using R: A Step-By-Step Guide. Routledge. 2014. [Google Scholar]
  • 72.R Core Team. R: A language and environment for statistical computing. Vienna: Austria: R Foundation for Statistical Computing; 2020. Available from: https://www.R-project.org/ [Google Scholar]
  • 73.Rosseel Y. Lavaan: An R Package for Structural Equation Modeling. J Stat Softw. 2012; 48(2): 1–36. doi: 10.18637/jss.v048.i02 [DOI] [Google Scholar]
  • 74.Hu J, Yu R. The effects of ICT-based social media on adolescents’ digital reading performance: A longitudinal study of PISA 2009, PISA 2012, PISA 2015 and PISA 2018, Comput Educ. 2021; 175: 104342. doi: 10.1016/j.compedu.2021.104342 [DOI] [Google Scholar]
  • 75.Ryoo JH, Wang C, Swearer SM. Examination of the change in latent statuses in bullying behaviors across time. Sch Psychol Q. 2015;30(1): 105–122. doi: 10.1037/spq0000082 [DOI] [PubMed] [Google Scholar]
  • 76.Pichel R, Foody M, O’Higgins NJ, Feijóo S, Varela J, Rial A. Bullying, Cyberbullying and the Overlap: What Does Age Have to Do with It? Sustainability. 2021;13: 8527. doi: 10.3390/su13158527 [DOI] [Google Scholar]
  • 77.Stodt B, Wegmann E, Brand M. Predicting dysfunctional Internet use: The role of age, conscientiousness, and Internet literacy in Internet addiction and cyberbullying. Int J Cyber Behav Psychol Learn. 2016;6: 28–43. doi: 10.4018/978-1-5225-7666-2.ch013 [DOI] [Google Scholar]
  • 78.Rengifo M, Laham SM. Big Five personality predictors of moral disengagement: A comprehensive aspect-level approach. Pers Individ Diff. 2022;184: 231–235. doi: 10.1016/j.paid.2021.111176 [DOI] [Google Scholar]
  • 79.Pan B, Zhang L, Ji L, Garandeau CF, Salmivalli C, Zhang W. Classroom Status Hierarchy Moderates the Association between Social Dominance Goals and Bullying Behavior in Middle Childhood and Early Adolescence. J Youth Adolescence. 2020;49: 2285–2297. doi: 10.1007/s10964-020-01285-z [DOI] [PubMed] [Google Scholar]
  • 80.Lozano-Blasco R, Latorre-Martínez MP, Cortés-Pascual. Screen addicts: A meta-analysis of internet addiction in adolescence. Child. Youth Serv. Rev. 2022;135: 106373. doi: 10.1016/j.childyouth.2022.106373 [DOI] [Google Scholar]
  • 81.Paez GR. Cyberbullying among adolescents: a general strain theory perspective. J Sch Violence. 2018;17: 74–85. doi: 10.1080/15388220.2016.1220317 [DOI] [Google Scholar]
  • 82.Guo S, Liu J, Wang J. Cyberbullying roles among adolescents: a social-ecological theory perspective. J Sch Violence. 2021;.20: 167–181. doi: 10.1080/15388220.2020.1862674 [DOI] [Google Scholar]
  • 83.Barlett CP, Bennardi C, Williams S, Zlupko T. Theoretically Predicting Cyberbullying Perpetration in Youth With the BGCM: Unique Challenges and Promising Research Opportunities. Front Psychol. 2021;12: 4203. doi: 10.3389/fpsyg.2021.708277 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 84.Dalton D, Ortegren M. Gender differences in ethics research: The importance of controlling for the social desirability response bias. J Bus Ethics 2011;103(1): 73–93. doi: 10.1007/s10551-011-0843-8 [DOI] [Google Scholar]
  • 85.Poltavski D, Van Eck R, Winger AT, Honts C. Using a Polygraph system for evaluation of the social desirability response bias in self-Report measures of aggression. Appl Psychophysiol Biofeedback. 2018;43: 309–318. doi: 10.1007/s10484-018-9414-4 [DOI] [PubMed] [Google Scholar]

Decision Letter 0

Mingming Zhou

4 Feb 2022

PONE-D-21-37456

How many cyberbullying(s)? A non-unitary perspective for offensive online behaviours

PLOS ONE

Dear Dr. Guidi,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we have decided that your manuscript does not meet our criteria for publication and must therefore be rejected.

Specifically, the reviewers expressed concerns with the methodology, data analysis and reports of the findings. 

I am sorry that we cannot be more positive on this occasion, but hope that you appreciate the reasons for this decision.

Yours sincerely,

Mingming Zhou, Ph.D.

Academic Editor

PLOS ONE

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Partly

Reviewer #3: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: No

Reviewer #3: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: No

Reviewer #3: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Dear author and editor,

I consider this research to be rigorous and useful to the scientific community.

However, we should improve some aspects to favor the reader's understanding. These are minor revisions.

Abstract: add all sociodemographic data, sex and age.

Theoretical framework: add more meta-analysis references that support your theoretical framework. Here are some studies that could be interesting:

Pan, Y. C., Chiu, Y. C., & Lin, Y. H. (2020). Systematic review and meta-analysis of epidemiology of internet addiction. Neuroscience & Biobehavioral Reviews, 118, 612-622. https://doi.org/10.1016/j.neubiorev.2020.08.013.

Modecki, K. L., Minchin, J., Harbaugh, A. G., Guerra, N. G., & Runions, K. C. (2014). Bullying Prevalence Across Contexts: A Meta-analysis Measuring Cyber and Traditional Bullying. Journal of Adolescent Health, 55(5), 602-611. https://doi.org/10.1016/j.jadohealth.2014.06.007

Marciano, L., Schlz, P. J., & Camerini, A. L. (2020). Cyberbullying perpetration and victimization in youth: A meta-analysis of longitudinal studies. Journal of Computer-Mediated Communication, 25(2), 163-181. https://bit.ly/3iK8b0g

Lei, H., Li, S., Chiu, M. M., & Lu, M. (2018). Social support and Internet addiction among mainland Chinese teenagers and young adults: A meta-analysis. Computers in Human Behavior, 85, 200-209. https://doi.org/10.1016/j.chb.2018.03.041. https://doi.org/10.1016/j.chb.2018.03.041

Lozano-Blasco, R., Cort'es-Pascual, A., & Latorre-Martínez, M. P. (2020). Being a cybervictim and a cyberbully - The duality of cyberbullying: A meta-analysis. Computers in Human Behavior, 111, 106444. https://doi.org/10.1016/j. chb.2020.106444.

1. Lozano-Blasco, R.; Cortés-Pascual, A. Problematic Internet uses and depression in adolescents: A meta-Analysis. Comunicar 2020, 28, 109-120. [Google Scholar] [CrossRef].

Holt, M. K., Vivolo-Kantor, A. M., Polanin, J. R., Holland, K. M., DeGue, S., Matjasko, J. L., Wolfe, M., & Reid, G. (2015). Bullying and Suicidal Ideation and Behaviors: A Meta-Analysis. PEDIATRICS, 135(2), e496-e509. https://doi.org/10.1542/peds.2014-1864.

Methodology: add a main figure where the procedure and research design are visually explained.

Participants: write the sociodemographic information in a table to make it more visual. Clarify the regions that have been involved in Italy, a heat map would bring innovation and creativity.

Instruments: very well developed but do not forget to put the Italian version next to the name. In the references it is fine, but it is important for the scientific community to see that you have used standardized tests adapted to their culture.

Statistical analysis: very well developed, do you think that mediation analysis could provide more information on the moderating variables?

Results: very interesting but Figure 1 has poor visual quality. The concepts are very good but it looks very blurry and the size of the numbers is very small. The same happens with figure 2. Try to use some application like Canva, Flourish that allows you to improve the quality.

Discussion: I liked it very much, but to give it a plus of quality I recommend that you review more references on the use of social networks and cyberbullying. Add more meta-analysis studies that allow you to give more robustness to your claims. Adding the hypotheses in the text was a great idea. The limitations are very sincere and clear, but I miss two paragraphs on practical implications this research would have.

Conclusions: they are great, but you usually don't put references in this section, could you upload those references to discussion and rewrite those sentences in a more general way?

Supplementary material: it is very honest that you upload the questionnaire, but it is an opportunity for this to be used by others. I would encourage you to upload the data of your rating along with it, so that it can be used.

Once again, thank you for your thoroughness and good work.

Reviewer #2: Despite the great efforts, authors are advised to make substantial changes to the manuscript as stated below. Because the review found some limitations regarding methods and results, comments on the discussion section are not addressed.

2. Methods

- Please mention the data collection period and explain the sampling method used

- Were the participants in the study all high school students? It seems like adolescents and young adults are mixed as authors included the age range from 14 to 25.

- Where is the reference to the use of social networks and feelings related to network use questionnaires? Please provide the original reference and how they were modified.

- Are the scales used in the survey all well-validated and -translated in Italian? If not validated, how was it applied to the survey? Did the researcher manually translate the items? If the scales are modified from the original version, please indicate both the original and revised version.

3. Results

- It seems like the results of chi-square is only reported in the text, did the authors not create table?

- Authors attempted to test several hypotheses but having so many hypotheses often mislead the readers to lose focus of the study. To make the results section more reader-friendly, it is recommended for the authors to match the results with the corresponding hypotheses so that they/we could understand why these results are presented in this section.

- When reviewing the methods section, I thought six items used to measure cyberbullying would be combined as a single variable instead of splitting each item. If the purpose of the current study was to measure the different types of cyberbullying, it was more appropriate to choose a scale consisting of several subscales rather than splitting a single measurement tool by items. This is a big limitation therefore it should be clearly stated in the limitation section.

- I don’t quite understand the intention behind conducting the EFA, CFA, and structural equation modelling in this study. This study did not develop a scale nor did it validate the existing scale. Why should these analyses be performed? For what purpose?

- Figure 2 is very confusing, and it is not a typical arrangement for SEM. Please refer back to other SEM research to redraw the figure. Why is there no latent variable for openness, extraversion etc. and for social network uses? Just by looking at this figure, the DV and IV are unclear.

Lastly, the sentences are way too long in some paragraphs. Please polish the language in order to improve the overall quality of the manuscript.

Reviewer #3: This paper conducted a questionnaire that was administered to a large sample of high school students to validate the four hypotheses regarding cyberbullying. These research questions are interesting and provide insights about cyberbullying behavior. For example, statistical analyses in this work show that cyberbullying is not a unitary construct but a multidimensional construct.

I have following suggestions to further improve the manuscript:

1. Given the extreme popularity of AI and Machine Learning, in related work, the authors might consider including recent works that used machine learning models to validate similar findings. For example, in [1], the authors showed that user's personality traits and peer influence are important predictors of cyberbullying. In [2], the authors also showed capturing the repetitive pattern in cyberbullying behavior can improve the performance.

2. The figures are very low-quality and it is hard to read. The authors need to replace them with high-resolution figures.

3. The cyberbullying definition is not clear, and sometimes confuses with other similar concept, such as cyber-aggression [3]. The authors need to clarify these differences.

[1] PI-bully: Personalized cyberbullying detection with peer influence

[2]Hierarchical attention networks for cyberbullying detection on the instagram social network

[3]Cyberbullying: Bullying in the digital age

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Raquel Lozano Blasco

Reviewer #2: No

Reviewer #3: No

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

- - - - -

For journal use only: PONEDEC3

Attachment

Submitted filename: How many cyberbullying(s).docx

PLoS One. 2022 Jul 19;17(7):e0268838. doi: 10.1371/journal.pone.0268838.r002

Author response to Decision Letter 0


29 Mar 2022

Response to Academic Editor

C.1. Dear Dr. Guidi,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we have decided that your manuscript does not meet our criteria for publication and must therefore be rejected.

Specifically, the reviewers expressed concerns with the methodology, data analysis and reports of the findings.

R.E.1. We are sincerely puzzled by this editorial decision, which goes against the suggestions of the reviewers, none of which suggested a rejection decision on our manuscript. Actually, two reviewers (Reviewer 1 and 3) only asked for minor revisions (one going as far as describing our research "rigorous and useful to the scientific community", calling the statistical analysis section "very well developed", the results "very interesting" and the conclusions "great"!), and provided each a few suggestions for improving the manuscript, that we have addressed in the revised manuscript attached (in track changes).

The third one (Reviewer 2) requested substantial changes to the manuscript and raised a number of points concerning the methods and results sections, to which we also have responded pointly in the dedicated section and in the revision.

Additional comments after authors’ query:

[...] C.2 I share the same concern with Reviewer 2 about the methodology and result section. Without validating the selected scales in the first place, it is really hard to say how convincing the findings would be.

R.E.2. We thank the Editor for clarifying the reasons for her decision in response to our query. We perfectly understand the importance of validation of a measure, and agree with the Editor about it being a requirement. But we do not believe that in our study lack of validity could be an issue. First of all in our case concerns could only apply to the validity of the Italian translation of some scales (the cyberbullying and moral disengagement for cyberbullying), because the original versions had been validated.

But our own data from this study (CFA), as well as from a previously published study (https://link.springer.com/chapter/10.1007/978-3-030-49570-1_20) by our group (in which SEM models were used showing very good fit of the measurement model for both the bullying and for moral disengagement scales used in the manuscript we submitted to PlosONE) in our view already provide evidence of the validity of the Italian translation we had previously devised and adopted in this study.

But this wouldn't be the first time that PlosONE published papers concerning studies in which some scales that were not validated in Italian were used. Just to cite a couple of papers I could list this

https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0243194 that used the Italian version of the WHO-5 well-being scale that, while widely used, to our knowledge has never been validated in a dedicated study.

Or this other study https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0142715 in which the adapted Italian version of a bullying/victimization scale was used, a scale that although used in other studies was never validated (we traced the references two levels down to verify).

Lastly, we note that Reviewer 2 did not consider that our manuscript should be rejected for lack of validity, but asked for more information, and as we also responded to the reviewer in the dedicated section, we have now revised the manuscript to include more information about this.

C.3. Also, the examination of the factorial structure of the cyberbully scale (RQ4, which looked to me less as an independent research question but more as a necessary step of the data analysis) found both one-factor and two-factor model made good fits to the model. The adoption of the two-factor model thus needs a stronger justification. Is there any conceptual meaning of each of these two factors? I wonder if the same two-factor structure could be replicated with another sample. Theoretical underpinning would be necessary to support this two-factor model.

R.E.3. Concerning the 2-factor model, we do believe both that the factors have conceptual meaning (as clearly stated in the manuscript, one is mainly related to Direct aggressions toward someone else online, and the other to Behaviours that damage the social image or reputation of someone else) and also that the procedure to test this 2 factor solution is valid and could be replicated in another sample providing the same results. After all, the EFA was conducted on a random subset of a dataset that comprised responses from a wide and geographically diverse sample of Italian students (randomly split in a smaller train and a larger test subsamples). And CFA confirmed the extracted factor structure in another sample. This analytic strategy is quite common in psychology research [1, 2]. It would have been different (and invalid) if we had run the EFA and the CFA on the same sample, but we did not, and our procedure is also indicated as a viable solution in [3].

To further test the replicability of the factor structure, we have now repeated 100 times the parallel analysis (to determine the number of factors) and the EFA on 100 random samples of N = 336, extracting in each case 2 factors, and comparing the factors structures extracted (the pattern of loadings) to the one in the model reported in the manuscript. In the majority of cases (55%) parallel analysis suggested 2 factors (1 factor was suggested only in 2% of the cases) and in 81.8% of the 2-factor models one or both factors overlapped with the 2 factors in the model that we reported. In other words, it seems to us that the model that we reported is both conceptually and empirically grounded. Moreover, a 2-factor model like ours could help explain inconsistencies in the findings in literature about the association between cyberbullying and other measures of social media use and personality.

[1] Igarashi, H., Kikuchi, H., Kano, R. et al. The Inventory of Personality Organisation: its psychometric properties among student and clinical populations in Japan. Ann Gen Psychiatry 8, 9 (2009). https://doi.org/10.1186/1744-859X-8-9

[2] Matsudaira T., Fukuhara, T., Kitamura, T., (2008). Factor structure of the Japanese Interpersonal Competence Scale. Psychiatry and Clinical Neurosciences. 62(2), 142-151. https://doi.org/10.1111/j.1440-1819.2008.01747.x

[3] Fokkema, M., & Greiff, S. (2017). How performing PCA and CFA on the same data equals trouble: Overfitting in the assessment of internal structure and some editorial thoughts on it [Editorial]. European Journal of Psychological Assessment, 33(6), 399–402. https://doi.org/10.1027/1015-5759/a000460

C.4. It also appears that this two-factor model was not well reflected in Table 3 and 4.

R.E.4. We understand that in Table 4 and 5 (formerly Table 3 and 4) a clear pattern in cyberbullying association with demographic, personality and social media use variables is difficult to highlight. However, in Table 4 items 1 and 4 (both in Factor 1) show the same pattern of correlations with personality and MD, and in Table 5 item 3 and 5 (both in factor 2) are affected by the same predictors, and item 1 and 6 (in different factors in our model) have different pattern of significant predictors. Moreover, the results of the structural equation modeling analysis indicated that different variables are associated with the two different cyberbullying factors.

Response to Reviewer 1

C1.1. I consider this research to be rigorous and useful to the scientific community.

However, we should improve some aspects to favor the reader's understanding. These are minor revisions.

R1.1. We are thankful for the reviewer’s appreciation of our work, and for all the suggestions for improvement that we have followed in the revision process, as detailed in the following points.

C1.2. Abstract: add all sociodemographic data, sex and age.

R1.2. We have added sex, age and geographical area information in the abstract.

C1.3. Theoretical framework: add more meta-analysis references that support your theoretical framework. Here are some studies that could be interesting:

Pan, Y. C., Chiu, Y. C., & Lin, Y. H. (2020). Systematic review and meta-analysis of epidemiology of internet addiction. Neuroscience & Biobehavioral Reviews, 118, 612-622. https://doi.org/10.1016/j.neubiorev.2020.08.013.

Modecki, K. L., Minchin, J., Harbaugh, A. G., Guerra, N. G., & Runions, K. C. (2014). Bullying Prevalence Across Contexts: A Meta-analysis Measuring Cyber and Traditional Bullying. Journal of Adolescent Health, 55(5), 602-611. https://doi.org/10.1016/j.jadohealth.2014.06.007

Marciano, L., Schlz, P. J., & Camerini, A. L. (2020). Cyberbullying perpetration and victimization in youth: A meta-analysis of longitudinal studies. Journal of Computer-Mediated Communication, 25(2), 163-181. https://bit.ly/3iK8b0g

Lei, H., Li, S., Chiu, M. M., & Lu, M. (2018). Social support and Internet addiction among mainland Chinese teenagers and young adults: A meta-analysis. Computers in Human Behavior, 85, 200-209. https://doi.org/10.1016/j.chb.2018.03.041. https://doi.org/10.1016/j.chb.2018.03.041

Lozano-Blasco, R., Cort'es-Pascual, A., & Latorre-Martínez, M. P. (2020). Being a cybervictim and a cyberbully - The duality of cyberbullying: A meta-analysis. Computers in Human Behavior, 111, 106444. https://doi.org/10.1016/j.chb.2020.106444.

Lozano-Blasco, R.; Cortés-Pascual, A. Problematic Internet uses and depression in adolescents: A meta-Analysis. Comunicar 2020, 28, 109-120. [Google Scholar] [CrossRef].

Holt, M. K., Vivolo-Kantor, A. M., Polanin, J. R., Holland, K. M., DeGue, S., Matjasko, J. L., Wolfe, M., & Reid, G. (2015). Bullying and Suicidal Ideation and Behaviors: A Meta-Analysis. PEDIATRICS, 135(2), e496-e509. https://doi.org/10.1542/peds.2014-1864.

R1.3. We are grateful for suggestions to supplement the theoretical framework: 4 references have been included and briefly illustrated in the introductory sections of the manuscript.

C1.4. Methodology: add a main figure where the procedure and research design are visually explained.

R1.4. We have inserted a new figure (Figure 1 - below) in the revised manuscript which summarizes visually the research methodology and its main steps. We thank the Reviewer for suggesting this.

C1.5. Participants: write the sociodemographic information in a table to make it more visual. Clarify the regions that have been involved in Italy, a heat map would bring innovation and creativity.

R1.5. We have added a table with demographic information (Table 1), including information about geographical distribution. We thank the reviewer for the suggestion of inserting a heatmap for the geographical distribution, but decided not to follow it, to reduce the number of figures and since it would have provided only limited information in addition to what is now presented in Table 1.

C1.6. Instruments: very well developed but do not forget to put the Italian version next to the name. In the references it is fine, but it is important for the scientific community to see that you have used standardized tests adapted to their culture.

R1.6. We have specified that we used the Italian version of the scales used, and included a reference to the study that includes information about the validity of the scales.

C1.7. Statistical analysis: very well developed, do you think that mediation analysis could provide more information on the moderating variables?

R1.7. We thank the reviewer for suggesting this analysis. We have followed the reviewer’s suggestion and conducted additional analyses to investigate mediation and moderation. We have included in the SEM model direct effects for each of the personality traits on moral disengagement as a possible mediator (of their effect on the cyberbullying factors), and formally tested the indirect effects mediated by moral disengagement (the results are discussed in the revised manuscript and the test of all the indirect and total effects are reported in a new table - Table 7). Moreover, to investigate the role of categorical factors as as gender, time on social networks and number of SN profiles as moderators of the (direct and mediated) effects of personality and moral disengagement on cyberbullying, we have conducted multigroup SEM analyses.

C1.8. Results: very interesting but Figure 1 has poor visual quality. The concepts are very good but it looks very blurry and the size of the numbers is very small. The same happens with figure 2. Try to use some application like Canva, Flourish that allows you to improve the quality.

R1.8. We completely agree with the comment of the reviewer about the low quality of the images. However, the files that we uploaded during the submission were all high-resolution, high-quality images (600 dpi), and their quality was downgraded somehow by the submission system that created the pdf of the manuscript. We have inserted here the high-quality version of both figures (one of these figures has been changed in response to a query by the second reviewer and of new analyses conducted. If we will be allowed to submit the revised version, we will try to upload even higher-resolution files.

C1.9. Discussion: I liked it very much, but to give it a plus of quality I recommend that you review more references on the use of social networks and cyberbullying. Add more meta-analysis studies that allow you to give more robustness to your claims. Adding the hypotheses in the text was a great idea. The limitations are very sincere and clear, but I miss two paragraphs on practical implications this research would have.

R1.9. Two new references (Pan et al., 2020; Lozano-Blasco et al., 2022) concerning meta-analysis studies on internet addiction have been added - one of which briefly discussed, to support our claims. We have also added some considerations about practical implications of our research at the end of the discussion.

C1.10. Conclusions: they are great, but you usually don't put references in this section, could you upload those references to discussion and rewrite those sentences in a more general way?

R1.10. We have revised the conclusion, moving the references to the discussion section and re-writing some sentences.

C1.11. Supplementary material: it is very honest that you upload the questionnaire, but it is an opportunity for this to be used by others. I would encourage you to upload the data of your rating along with it, so that it can be used.

R1.11. We are glad that the reviewer appreciated the inclusion of the questionnaire in the supplementary materials. We are not sure to understand what the reviewer would like us to upload, since we already provided the ratings for the cyberbullying items. If the reviewer intended that we should also provide the ratings for the personality and moral disengagement items as well (and not only the aggregated scores), they can be already found in SM2.zip (file SM2_data_descriptives.RData).

Response to Reviewer 2

C2.1. Despite the great efforts, authors are advised to make substantial changes to the manuscript as stated below. Because the review found some limitations regarding methods and results, comments on the discussion section are not addressed.

R2.1. We have revised the manuscript in order to address the issues raised by the reviewer, as indicated in the following points.

C2.2 Methods: Please mention the data collection period and explain the sampling method used

R2.2. We have included in the methods section information about the data collection period and sampling method. We thank the reviewer for pointing out the lack of this information in the original manuscript.

C2.3 Methods: Were the participants in the study all high school students? It seems like adolescents and young adults are mixed as authors included the age range from 14 to 25.

R2.3. Yes, the participants were all high school students. The 19 participants that were in the 21-25 age group were all 21.

C2.4 Methods: Where is the reference to the use of social networks and feelings related to network use questionnaires? Please provide the original reference and how they were modified.

R2.4. There is no reference to these items. Maybe it was not sufficiently clear in the method section that these items were devised ad hoc for this study to measure different facets of social networks use. Actually, all the questions have been reported in the text. They were not meant to provide an aggregate measure of social media use, but as ways to profile participants along some specific characteristics of their use of social networks (e.g. time), in order to investigate differences in cyberbullying across these variables, as it is common to do in similar research [e.g. reference 39]. Concerning the measure about the feelings related to social network use, we had already acknowledged among the limitations of the study the fact that this dimension was not measured with sufficient reliability.

[38] Park S, Na E-Y, Kim E-M. The relationship between online activities, netiquette and cyberbullying. Child Youth Serv Rev. 2014; 42: 74–81. doi: 10.1016/j.childyouth.2014.04.002.

C2.5. Methods: Are the scales used in the survey all well-validated and -translated in Italian? If not validated, how was it applied to the survey? Did the researcher manually translate the items? If the scales are modified from the original version, please indicate both the original and revised version.

R2.5. The scale used for measuring personality was the validated Italian version of the 10 item Personality Inventory [ref 70]. The scales used to measure cyberbullying and moral disengagement about cyberbullying were validated in English [ref 51], and had been translated in Italian by the authors for a previous study, in which Confirmatory Factor Analysis and SEM validated the translation replicating the findings of the study that introduced these scales. [ref 68]

[70] Guido G, Peluso AM, Capestro M, Miglietta M. An Italian version of the 10-item Big Five Inventory: An application to hedonic and utilitarian shopping values. Pers Individ Differ. 2015; 76: 135–140. doi:. 10.1016/j.paid.2014.11.053.

[51] Meter DJ, Bauman S. Moral disengagement about cyberbullying and parental monitoring: Effects on traditional bullying and victimization via cyberbullying involvement. J Early Adolesc. 2018. 38: 303–326. doi: 10.1177/0272431616670752.

[68] Parlangeli O, Marchigiani E, Guidi S, Bracci M, Andreadis A, Zambon R. I Do It Because I Feel that...Moral Disengagement and Emotions in Cyberbullying and Cybervictimisation. In: Meiselwitz G., editor. Social Computing and Social Media. Design, Ethics, User Behavior, and Social Network Analysis. HCII 2020. Lecture Notes in Computer Science, vol 12194. Cham: Springer; 2020. pp. 289-304. doi: 10.1007/978-3-030-49570-1_20.

C2.6. Results: It seems like the results of chi-square is only reported in the text, did the authors not create table?

R2.6. We did create the tables for all the chi-square tests conducted, but we omitted them from the manuscript choosing to highlight the main findings (for which groups frequencies differed). (Note: it is not clear from the reviewer’s comment which tables the reviewer had in mind). We could include these tables as supplementary materials of the revised manuscript.

C2.7. Results: Authors attempted to test several hypotheses but having so many hypotheses often mislead the readers to lose focus of the study. To make the results section more reader-friendly, it is recommended for the authors to match the results with the corresponding hypotheses so that they/we could understand why these results are presented in this section.

R2.7. Although we understand that the many results presented in the results section, deriving from a complex study addressing several research questions and testing several hypothesis, might mislead the readers to lose focus of the study, we also believe that the way the results are currently organized is logical and follow the logical order highlighted in the statistical analysis section in order to answer the research questions. Moreover, the discussion section (not addressed by the comments by the reviewer) matches the results to the research questions and hypotheses. We have however edited the results subsections titles in order to make it more evident the link with the research questions and hypotheses that the results in each subsection are functional to address. Also, in response to a suggestion by Reviewer 1 we have included immediately before the Results section a visual summary of the methodology of the study, in which the research questions are put in correspondence with the different types of data analyses conducted.

C2.8. Results: When reviewing the methods section, I thought six items used to measure cyberbullying would be combined as a single variable instead of splitting each item. If the purpose of the current study was to measure the different types of cyberbullying, it was more appropriate to choose a scale consisting of several subscales rather than splitting a single measurement tool by items. This is a big limitation therefore it should be clearly stated in the limitation section.

R2.8. Actually, this was the aim of the study: to verify whether a scale, made up of “only” 6 items, and which is usually used as a tool to measure cyberbullying as a unitary phenomenon, could not instead be revealing of different aspects, different reasons and different manifestations of harmful virtual behavior. To test this hypothesis we tried to relate the personality traits and the mechanisms of Moral Disengagement with each of the items, and again for this reason we conducted the factor analysis.

The results go in the hypothesized direction: for each of the behaviors related to each item, different relationships with personality traits can be highlighted. Factor analysis also suggested the existence of at least two factors.

We hope that in the revised version of our manuscript this will be clearer.

C2.9. Results: I don’t quite understand the intention behind conducting the EFA, CFA, and structural equation modelling in this study. This study did not develop a scale nor did it validate the existing scale. Why should these analyses be performed? For what purpose?

R2.9. The reasons for conducting the analyses highlighted in the reviewer’s comment are first of all related to research question 4, in conjunction with the previous research questions. This research question concerned whether cyberbullying is better conceived and measured as a unitary construct or as a multidimensional construct, and to this aim exploratory factor analysis followed by confirmatory factor analysis is a common analytical strategy. In a way, it can be seen as an attempt to validate the scale by Meter and Bauman, since the items that we used to measure cyberbullying were taken from that scale. The SEM analysis was conducted to test hypotheses about the association between the different latent factors of cyberbullying, personality traits, moral disengagement and other variables. In the revised version of the manuscript we present additional multigroup SEM analyses conducted to better investigate differences across groups and to test hypotheses about mediation (by moral disengagement) and moderation (by gender, time on social networks and number of profiles) on the effect of personality and moral disengagement on the different types of cyberbullying (as measured by the two latent factors extracted by the previous steps - EFA/CFA). We have revised the statistical analysis and results sections of the paper to make it clearer what was the purpose of all these analyses.

C2.10. Results: Figure 2 is very confusing, and it is not a typical arrangement for SEM. Please refer back to other SEM research to redraw the figure. Why is there no latent variable for openness, extraversion etc. and for social network uses? Just by looking at this figure, the DV and IV are unclear.

R2.10. We realize that figure 2 was not a typical display of a SEM model, as we had introduced some mapping between coefficients’ size/sign/significance and visual features (width, color and linetype) to make some patterns more evident. But in the revised manuscript, that includes the results of new analyses conducted in response to a comment by Reviewer 1, we have redrawn the figure (now Figure 3) making it more similar to typical SEM path diagrams. However, we have kept the color coding scheme for the paths representing the direction of the association, and we have also used dashed lines to represent insignificant path coefficients in the fitted model, as we believe it makes it easier to read the effects in complex models like this one.

C2.11: Lastly, the sentences are way too long in some paragraphs. Please polish the language in order to improve the overall quality of the manuscript.

R2.11. We have edited the language to improve readability and overall manuscript quality.

Response to Reviewer 3

C3.1. This paper conducted a questionnaire that was administered to a large sample of high school students to validate the four hypotheses regarding cyberbullying. These research questions are interesting and provide insights about cyberbullying behavior. For example, statistical analyses in this work show that cyberbullying is not a unitary construct but a multidimensional construct.

R3.1. We thank reviewer 3 for appreciating the underlying rationale of our study and the results we obtained

C3.2. I have following suggestions to further improve the manuscript:

1. Given the extreme popularity of AI and Machine Learning, in related work, the authors might consider including recent works that used machine learning models to validate similar findings. For example, in [1], the authors showed that user's personality traits and peer influence are important predictors of cyberbullying. In [2], the authors also showed capturing the repetitive pattern in cyberbullying behavior can improve the performance.

[1] PI-bully: Personalized cyberbullying detection with peer influence

[2]Hierarchical attention networks for cyberbullying detection on the instagram social network

R3.2. In fact, in the previous version of this manuscript there was only one reference related to this important field of research.

Now, in the introduction, 7 more references have been added and discussed, including those suggested by the reviewer.

C3.3. 2. The figures are very low-quality and it is hard to read. The authors need to replace them with high-resolution figures.

R3.3. As we stated in R1.X We agree on the low quality of the figures. However, the files that we uploaded during the submission were all high-resolution, high-quality images (600 dpi), and their quality was downgraded somehow by the submission system that created the pdf of the manuscript. We are sure that in the final version of this manuscript all figures will be high-quality images.

C3.4. 3. The cyberbullying definition is not clear, and sometimes confuses with other similar concept, such as cyber-aggression [3]. The authors need to clarify these differences.

[3]Cyberbullying: Bullying in the digital age

R3.4. In the introduction it has been clarified, also reporting two new references, which is the generally shared definition of cyberbullying and its differences with cyber incivility and cyber aggression

Attachment

Submitted filename: Response to Reviewers.docx

Decision Letter 1

Sergio A Useche

10 May 2022

How many cyberbullying(s)? A non-unitary perspective for offensive online behaviours

PONE-D-21-37456R1

Dear Dr. Guidi,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Sergio A. Useche, Ph.D.

Academic Editor

PLOS ONE

Journal requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf.

2. You indicated that you had ethical approval for your study. In your Methods section, please ensure you have also stated whether you obtained consent from parents or guardians of the minors included in the study or whether the research ethics committee or IRB specifically waived the need for their consent.

3. Please remove your figures from within your manuscript file, leaving only the individual TIFF/EPS image files, uploaded separately. These will be automatically included in the reviewers’ PDF.

4. Please ensure that you refer to Figure 1 in your text as, if accepted, production will need this reference to link the reader to the figure.

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: (No Response)

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Dear Editor and Authors,

The research is of high quality, the authors have greatly improved their work. In addition, they have been able to respond to all the reviewers' responses in a consistent manner. I would also like to emphasize the value of this research as it brings very important and interesting information to the use of new technologies. My sincere congratulations.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes:

Acceptance letter

Sergio A Useche

30 May 2022

PONE-D-21-37456R1

How many cyberbullying(s)? A non-unitary perspective for offensive online behaviours

Dear Dr. Guidi:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org.

If we can help with anything else, please email us at plosone@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Sergio A. Useche

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Text. Questionnaire.

    Full text of questionnaire used in the study.

    (PDF)

    S1 Script. R script for conducting the descriptive statistics reported in the paper.

    (R)

    S2 Script. R for conducting the regression analyses reported in the paper.

    (R)

    S3 Script. R script for conducting the exploratory and confirmatory factor analyses reported in the paper and the latent variable path analysis / SEM.

    (R)

    S1 Dataset. R Dataset for descriptive statistics.

    Data are in native R format.

    (RDATA)

    S2 Dataset. R Dataset used for the regression and SEM analyses.

    Data are in native R format.

    (RDATA)

    S3 Dataset. Dataset used for the regression and SEM analyses.

    Data are in native comma separated value format.

    (CSV)

    S1 File. Plots of the effects of the significant predictors in the ordinal logistic regression models.

    Each plot represents the estimated probability of the different responses concerning the frequency of perpetration of a given type of cyberbullying behaviour, as a function of one of the significant predictors. The probabilities were estimated from the fitted regression models presented in the paper. All the code for reproducing the plots is provided in S2 File.

    (PDF)

    S2 File. Multigroup SEM analyses.

    The results of the multigroup analyses for three grouping factors are reported in this file: a) gender (females vs males), b) time on social network (>3 h/d vs 1–3 h/d), and number of social networks profiles (1 profile vs >1 profiles). For each factor we present the goodness-of-fit statistics of models assuming different levels of invariance and the path coefficients for the model assuming strong invariance.

    (PDF)

    Attachment

    Submitted filename: How many cyberbullying(s).docx

    Attachment

    Submitted filename: Response to Reviewers.docx

    Data Availability Statement

    All relevant data are within the manuscript and its Supporting Information files (S2 File).


    Articles from PLoS ONE are provided here courtesy of PLOS

    RESOURCES